Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 8, Problem 4RQ
Explanation of Solution
Authentication methods:
- Authentication denotes the ability to verify that a person claims to be.
- The methods are shown below:
- Passwords:
- The passwords will be known to authorized users only.
- Token:
- It denotes a physical device designed for providing identity of a single user...
- Passwords:
Explanation of Solution
Roles of firewalls, intrusion detection systems and antivirus software to promote security:
- Firewall:
- A firewall denotes a mixture of software as well as hardware.
- It controls traffic flow that is incoming as well as outgoing.
- The internal networks are been prevented from unauthorized access.
- It monitors packets with incorrect source or destination and protects internal systems.
- It offers proxy server by no access to internal documents.
- It restricts type of messages that get through networks...
Explanation of Solution
Protecting encrypted information:
- It denotes coding as well as scrambling of messages used to secure transmissions over the Internet...
Explanation of Solution
Role of encryption and digital certificates:
- The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
- Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...
Explanation of Solution
Disaster recovery planning and business continuity planning:
- Disaster recovery planning:
- It creates plans for renovation of services after any event of natural calamity.
- It focuses on technical concerns involved in keeping systems functioning.
- It denotes back up files as well as maintenance of backup systems or recovery services...
Explanation of Solution
Security problems in cloud computing:
- The company needs to make sure data protection at a level that meets requirements of corporate.
- The company stipulates to cloud provider for data storage based on privacy rules.
- The encryption
mechanism of cloud provider should be verified by company...
Explanation of Solution
Measures to improve software quality and reliability:
- The measures for improving software quality and reliability are shown below:
- Software metrics:
- It denotes objective assessments of system in from of quantified measurements.
- It allows department of
information systems and end users for combined measure of system performance. - It helps to recognize problems that occur.
- The metrics must be designed carefully and should have consistent usage.
- The examples of software metrics includes:
- Count of transactions processed within a particular time.
- Online response time.
- Count of bugs per hundred lines of code...
- Software metrics:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionChapter 8 Solutions
Management Information Systems: Managing The Digital Firm (16th Edition)
Ch. 8.2 - Prob. 1.1CQCh. 8.2 - Prob. 1.2CQCh. 8.2 - Prob. 1.3CQCh. 8.4 - Prob. 2.1CQCh. 8.4 - Prob. 2.2CQCh. 8.4 - Prob. 2.3CQCh. 8.4 - Prob. 2.4CQCh. 8 - Prob. 1IQCh. 8 - Prob. 2IQCh. 8 - Prob. 3IQ
Ch. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11HMPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education