Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 4RQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Roles of firewalls, intrusion detection systems and antivirus software to promote security:
- Firewall:
- o A firewall denotes mixture of software as well as hardware.
- o It controls traffic flow that is incoming as well as outgoing.
- o The internal networks are been prevented from unauthorized access.
- o It monitors packets with incorrect source or destination and protects internal systems.
- o It offers proxy server by no access to internal documents.
- o It restricts type of messages that get through networks...
Explanation of Solution
Encryption protects information:
- It denotes coding as well as scrambling of messages used to secure transmissions over internet...
Explanation of Solution
Role of encryption and digital certificates:
- The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
- Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...
Explanation of Solution
Disaster recovery planning and business continuity planning:
- Disaster recovery planning:
- o It creates plans for renovation of services after any event of natural calamity.
- o It focuses on technical concerns involved in keeping systems functioning.
- o It denotes back up files as well as maintenance of backup systems or recovery services...
Explanation of Solution
Security problems in cloud computing:
- The company needs to make sure data protection at a level that meets requirements of corporate.
- The company stipulates to cloud provider for data storage based on privacy rules.
- The encryption
mechanism of cloud provider should be verified by company...
Explanation of Solution
Measures to improve software quality and reliability:
- The measures for improving software quality and reliability are shown below:
-
o Software metrics:
- It denotes objective assessments of system in from of quantified measurements.
- It allows department of information systems and end users for combined measure of system performance.
- It helps to recognize problems that occur.
- The metrics must be designed carefully and should have consistent usage.
- The examples of software metrics includes:
- Count of transactions processed within a particular time.
- Online response time...
-
o Software metrics:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain firewalls in network security and privacy. Clarify the phrase and provide business examples and statistics.
: Define cyber forensics and explain where and what type of evidence can be identified and collected from digital devices.
You have to define what cyber security is. You have also need to identify where in computer systems evidence can be collected
No hand writing AND No similaritiy please
THANK YOU
Discuss the many forms of network and cyber security breaches, as well as how to avoid them.
Computer science
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- Identify theft has impacted millions of people and businesses around the globe and is often caused by notmitigating one’s own risk and their lack of knowledge of the proper use of computers. What protectivemeasures do you believe people and businesses should take to reduce their risks and do you believe thefederal government should take stronger protective actions and if so, what should they do? Research andwrite a 1200-1400 words essay response to your findings. Thank youarrow_forwardWhat do you consider to be the most important cyber security legal issues? Elaboratearrow_forwardRelated to Cyber security riskarrow_forward
- Define the importance of firewalls in light of the security offered by networks and the internet. Explain the term's meaning in the context of business with the use of examples and numbers.arrow_forwardDescribe the role of cybersecurity in modern IT. Discuss common security threats, such as malware, phishing, and DDoS attacks, and explain strategies and technologies used to protect information systems.arrow_forwardDescribe the principles of cybersecurity in the field of information technology. Discuss common threats and mitigation strategies.arrow_forward
- Management Information Systems 1 Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum: Discuss why users try to break into other user's computers and information systems Discuss why users create viruses. Discuss who owns electronic mail systems, and why they do (2). Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers? What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents? (3). What is the difference between a business continuity plan and a disaster recovery plan?arrow_forwardWhat do you know about cybersecurity? Are your devices and personal info secure? What safety measures are you currently using to secure your devices and personal data? How would you approach and/or help a friend that you suspect is addicted to technology?arrow_forwardWhere have you seen cyber security flaws or exposures in the real world?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education