MANAGEMENT INFORMATION SYSTEMS
MANAGEMENT INFORMATION SYSTEMS
15th Edition
ISBN: 9780134640037
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 4RQ

Explanation of Solution

 Authentication methods:

  • Authentication denotes the ability to verify that a person claims to be.
  • The methods are shown below:
    • Passwords:
      • The passwords will be known to authorized users only.
    • Token:
      • It denotes a physical device designed for providing identity of a single user...

Explanation of Solution

Roles of firewalls, intrusion detection systems and antivirus software to promote security:

  • Firewall:
    • A firewall denotes a mixture of software as well as hardware.
    • It controls traffic flow that is incoming as well as outgoing.
    • The internal networks are been prevented from unauthorized access.
    • It monitors packets with incorrect source or destination and protects internal systems.
    • It offers proxy server by no access to internal documents.
    • It restricts type of messages that get through networks...

Explanation of Solution

Protecting encrypted information:

  • It denotes coding as well as scrambling of messages used to secure transmissions over the Internet...

Explanation of Solution

Role of encryption and digital certificates:

  • The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
  • Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...

Explanation of Solution

Disaster recovery planning and business continuity planning:

  • Disaster recovery planning:
    • It creates plans for renovation of services after any event of natural calamity.
    • It focuses on technical concerns involved in keeping systems functioning.
    • It denotes back up files as well as maintenance of backup systems or recovery services...

Explanation of Solution

Security problems in cloud computing:

  • The company needs to make sure data protection at a level that meets requirements of corporate.
  • The company stipulates to cloud provider for data storage based on privacy rules.
  • The encryption mechanism of cloud provider should be verified by company...

Explanation of Solution

Measures to improve software quality and reliability:

  • The measures for improving software quality and reliability are shown below:
    • Software metrics:
      • It denotes objective assessments of system in from of quantified measurements.
      • It allows department of information systems and end users for combined measure of system performance.
      • It helps to recognize problems that occur.
      • The metrics must be designed carefully and should have consistent usage.
      • The examples of software metrics includes:
        • Count of transactions processed within a particular time.
        • Online response time.
        • Count of bugs per hundred lines of code...

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education