MANAGEMENT INFORMATION SYSTEMS: MANAGING
16th Edition
ISBN: 9780135790939
Author: LAUDON
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1RQ
Program Plan Intro
System vulnerability:
- When huge amount of data is kept in electronic form, it becomes susceptible to many threats.
- The information systems in many locations are been interconnected through communication networks.
- The unauthorized access can occur at many access points in network and is not limited to a single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Malware:
- A malware denotes a program that is harmful to a computer user.
- It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.
Difference between a virus, a worm, and a Trojan horse:
Virus | Worm | Trojan horse |
A program that would replicate itself by being copied... |
Explanation of Solution
Hacker:
- A hacker denotes an individual who gains unauthorized access to computer system.
- It does so by finding security protection weakness in websites and computer systems...
Explanation of Solution
Computer crime:
- A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
- It is defined as commission of illegal acts through use of a computer or against computer system.
Examples of crime in which computers are targets:
The examples with computers as crime targets are shown below:
- Confidentiality breach for protected computerized data.
- Unauthorized access to computer systems.
- Accessing protected computers for committing fraud.
- Accessing protected computers for causing damage intentionally...
Explanation of Solution
Identity theft and phishing:
- Identity theft denotes a crime in which personal information pieces are obtained.
- It includes social security number, license number or credit card number to act as behalf of someone else.
- The information might be used for obtaining credit, merchandise or services in name of victim.
- It is a big problem today as internet has made easy for identity thieves to use stolen information.
- The goods could be purchased online without any personal interaction...
Explanation of Solution
Security and system reliability problems created by the employees:
- The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
- Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
- The system compromise happens when an employee lets coworker use the system...
Explanation of Solution
Software defects affecting system reliability and security:
- The software could fail to perform well or gives erroneous result because of undetected bugs.
- A control system may fail to carry messages or allow internet access.
- The customers may be wrongly charged due to such failures.
- The business may order more inventory than it requires...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
I need to develop and run a program that prompts the user to enter a positive integer n, and then calculate the value of n factorial n! = multiplication of all integers between 1 and n, and print the value n! on the screen. This is for C*.
I need to develop and run a C* program to sum up integers from 1 to 100, and print out the sum value on the screen. Can someone help please?
Given the schema below for the widgetshop, provide a
schema diagram.
Schema name
Attributes
Widget-schema
Customer-schema
(stocknum, manufacturer, description, weight,
price, inventory)
(custnum, name, address)
Purchased-schema (custnum, stocknum, pdate)
Requestedby-schema (stocknum, custnum)
Newitem-schema (stocknum, manufacturer, description)
Employee-schema (ssn, name, address, salary)
You can remove the Newitem-schema (red).
Chapter 8 Solutions
MANAGEMENT INFORMATION SYSTEMS: MANAGING
Ch. 8.2 - Prob. 1.1CQCh. 8.2 - Prob. 1.2CQCh. 8.2 - Prob. 1.3CQCh. 8.4 - Prob. 2.1CQCh. 8.4 - Prob. 2.2CQCh. 8.4 - Prob. 2.3CQCh. 8.4 - Prob. 2.4CQCh. 8 - Prob. 1IQCh. 8 - Prob. 2IQCh. 8 - Prob. 3IQ
Ch. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11HMPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- True or False: Given the sets F and G with F being an element of G, is it always ture that P(F) is an element of P(G)? (P(F) and P(G) mean power sets). Why?arrow_forwardCan you please simplify (the domain is not empty) ∃xF (x) → ¬∃x(F (x) ∨ ¬G(x)). Foarrow_forwardHistogramUse par(mfrow=c(2,2)) and output 4 plots with different argument settings.arrow_forward
- (use R language)Scatter plot(a). Run the R code example, and look at the help file for plot() function. Try different values for arguments:type, pch, lty, lwd, col(b). Use par(mfrow=c(3,2)) and output 6 plots with different argument settings.arrow_forward1. Draw flow charts for each of the following;a) A system that reads three numbers and prints the value of the largest number.b) A system reads an employee name (NAME), overtime hours worked (OVERTIME), hours absent(ABSENT) and determines the bonus payment (PAYMENT).arrow_forwardScenario You work for a small company that exports artisan chocolate. Although you measure your products in kilograms, you often get orders in both pounds and ounces. You have decided that rather than have to look up conversions all the time, you could use Python code to take inputs to make conversions between the different units of measurement. You will write three blocks of code. The first will convert kilograms to pounds and ounces. The second will convert pounds to kilograms and ounces. The third will convert ounces to kilograms and pounds. The conversions are as follows: 1 kilogram = 35.274 ounces 1 kilogram = 2.20462 pounds 1 pound = 0.453592 kilograms 1 pound = 16 ounces 1 ounce = 0.0283 kilograms 1 ounce = 0.0625 pounds For the purposes of this activity the template for a function has been provided. You have not yet covered functions in the course, but they are a way of reusing code. Like a Python script, a function can have zero or more parameters. In the code window you…arrow_forward
- make a screen capture showing the StegExpose resultsarrow_forwardWhich of the following is not one of the recommended criteria for strategic objectives? Multiple Choice a) realistic b) appropriate c) sustainable d) measurablearrow_forwardManagement innovations such as total quality, benchmarking, and business process reengineering always lead to sustainable competitive advantage because everyone else is doing them. a) True b) Falsearrow_forward
- Vision statements are more specific than strategic objectives. a) True b) Falsearrow_forwardThe three components of the __________ approach to corporate accounting include financial, environmental, and social performance measures. Multiple Choice a) stakeholder b) triple dimension c) triple bottom line d) triple efficiencyarrow_forwardCompetitors, as internal stakeholders, should be included in the stakeholder management consideration of a company and in its mission statement. a) True b) Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education