EBK MANAGEMENT INFORMATION SYSTEMS
EBK MANAGEMENT INFORMATION SYSTEMS
16th Edition
ISBN: 9780135192047
Author: LAUDON
Publisher: VST
Expert Solution & Answer
Book Icon
Chapter 8, Problem 4RQ

Explanation of Solution

 Authentication methods:

  • Authentication denotes the ability to verify that a person claims to be.
  • The methods are shown below:
    • Passwords:
      • The passwords will be known to authorized users only.
    • Token:
      • It denotes a physical device designed for providing identity of a single user...

Explanation of Solution

Roles of firewalls, intrusion detection systems and antivirus software to promote security:

  • Firewall:
    • A firewall denotes a mixture of software as well as hardware.
    • It controls traffic flow that is incoming as well as outgoing.
    • The internal networks are been prevented from unauthorized access.
    • It monitors packets with incorrect source or destination and protects internal systems.
    • It offers proxy server by no access to internal documents.
    • It restricts type of messages that get through networks...

Explanation of Solution

Protecting encrypted information:

  • It denotes coding as well as scrambling of messages used to secure transmissions over the Internet...

Explanation of Solution

Role of encryption and digital certificates:

  • The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
  • Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...

Explanation of Solution

Disaster recovery planning and business continuity planning:

  • Disaster recovery planning:
    • It creates plans for renovation of services after any event of natural calamity.
    • It focuses on technical concerns involved in keeping systems functioning.
    • It denotes back up files as well as maintenance of backup systems or recovery services...

Explanation of Solution

Security problems in cloud computing:

  • The company needs to make sure data protection at a level that meets requirements of corporate.
  • The company stipulates to cloud provider for data storage based on privacy rules.
  • The encryption mechanism of cloud provider should be verified by company...

Explanation of Solution

Measures to improve software quality and reliability:

  • The measures for improving software quality and reliability are shown below:
    • Software metrics:
      • It denotes objective assessments of system in from of quantified measurements.
      • It allows department of information systems and end users for combined measure of system performance.
      • It helps to recognize problems that occur.
      • The metrics must be designed carefully and should have consistent usage.
      • The examples of software metrics includes:
        • Count of transactions processed within a particular time.
        • Online response time.
        • Count of bugs per hundred lines of code...

Blurred answer
Students have asked these similar questions
What are the major threats of using the internet? How do you use it? How do children use it? How canwe secure it? Provide four references with your answer. Two of the refernces can be from an article and the other two from websites.
Assume that a string of name & surname is saved in S. The alphabetical characters in S can be in lowercase and/or uppercase letters. Name and surname are assumed to be separated by a space character and the string ends with a full stop "." character. Write an assembly language program that will copy the name to NAME in lowercase and the surname to SNAME in uppercase letters. Assume that name and/or surname cannot exceed 20 characters. The program should be general and work with every possible string with name & surname. However, you can consider the data segment definition given below in your program. .DATA S DB 'Mahmoud Obaid." NAME DB 20 DUP(?) SNAME DB 20 DUP(?) Hint: Uppercase characters are ordered between 'A' (41H) and 'Z' (5AH) and lowercase characters are ordered between 'a' (61H) and 'z' (7AH) in the in the ASCII Code table. For lowercase letters, bit 5 (d5) of the ASCII code is 1 where for uppercase letters it is 0. For example, Letter 'h' Binary ASCII 01101000 68H 'H'…
What did you find most interesting or surprising about the scientist Lavoiser?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education