Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 4RQ
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Roles of firewalls, intrusion detection systems and antivirus software to promote security:

  • Firewall:
    • o A firewall denotes mixture of software as well as hardware.
    • o It controls traffic flow that is incoming as well as outgoing.
    • o The internal networks are been prevented from unauthorized access.
    • o It monitors packets with incorrect source or destination and protects internal systems.
    • o It offers proxy server by no access to internal documents.
    • o It restricts type of messages that get through networks...

Explanation of Solution

Encryption protects information:

  • It denotes coding as well as scrambling of messages used to secure transmissions over internet...

Explanation of Solution

Role of encryption and digital certificates:

  • The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
  • Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...

Explanation of Solution

Disaster recovery planning and business continuity planning:

  • Disaster recovery planning:
    • o It creates plans for renovation of services after any event of natural calamity.
    • o It focuses on technical concerns involved in keeping systems functioning.
    • o It denotes back up files as well as maintenance of backup systems or recovery services...

Explanation of Solution

Security problems in cloud computing:

  • The company needs to make sure data protection at a level that meets requirements of corporate.
  • The company stipulates to cloud provider for data storage based on privacy rules.
  • The encryption mechanism of cloud provider should be verified by company...

Explanation of Solution

Measures to improve software quality and reliability:

  • The measures for improving software quality and reliability are shown below:
    • o Software metrics:
      • It denotes objective assessments of system in from of quantified measurements.
      • It allows department of information systems and end users for combined measure of system performance.
      • It helps to recognize problems that occur.
      • The metrics must be designed carefully and should have consistent usage.
      • The examples of software metrics includes:
        • Count of transactions processed within a particular time.
        • Online response time...

Blurred answer
Students have asked these similar questions
Lab 07: Java Graphics (Bonus lab) In this lab, we'll be practicing what we learned about GUIs, and Mouse events. You will need to implement the following: ➤ A GUI with a drawing panel. We can click in this panel, and you will capture those clicks as a Point (see java.awt.Point) in a PointCollection class (you need to build this). о The points need to be represented by circles. Below the drawing panel, you will need 5 buttons: о An input button to register your mouse to the drawing panel. ○ о о A show button to paint the points in your collection on the drawing panel. A button to shift all the points to the left by 50 pixels. The x position of the points is not allowed to go below zero. Another button to shift all the points to the right 50 pixels. The x position of the points cannot go further than the You can implement this GUI in any way you choose. I suggest using the BorderLayout for a panel containing the buttons, and a GridLayout to hold the drawing panel and button panels.…
If a UDP datagram is sent from host A, port P to host B, port Q, but at host B there is no process listening to port Q, then B is to send back an ICMP Port Unreachable message to A. Like all ICMP messages, this is addressed to A as a whole, not to port P on A. (a)  Give an example of when an application might want to receive such ICMP messages. (b)  Find out what an application has to do, on the operating system of your choice, to receive such messages. (c)  Why might it not be a good idea to send such messages directly back to the originating port P on A?
Discuss how business intelligence and data visualization work together to help decision-makers and data users. Provide 2 specific use cases.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning