MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
MANAGEMENT INFORMATION SYSTEMS LOOSELEAF
16th Edition
ISBN: 9780135205518
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 4RQ

Explanation of Solution

 Authentication methods:

  • Authentication denotes the ability to verify that a person claims to be.
  • The methods are shown below:
    • Passwords:
      • The passwords will be known to authorized users only.
    • Token:
      • It denotes a physical device designed for providing identity of a single user...

Explanation of Solution

Roles of firewalls, intrusion detection systems and antivirus software to promote security:

  • Firewall:
    • A firewall denotes a mixture of software as well as hardware.
    • It controls traffic flow that is incoming as well as outgoing.
    • The internal networks are been prevented from unauthorized access.
    • It monitors packets with incorrect source or destination and protects internal systems.
    • It offers proxy server by no access to internal documents.
    • It restricts type of messages that get through networks...

Explanation of Solution

Protecting encrypted information:

  • It denotes coding as well as scrambling of messages used to secure transmissions over the Internet...

Explanation of Solution

Role of encryption and digital certificates:

  • The digital certificates join with public key encryption for providing further protection of transaction by authenticating identity of user.
  • Digital certificates denote data fields used for establishing sender’s identity and provides receiver with means to encode reply...

Explanation of Solution

Disaster recovery planning and business continuity planning:

  • Disaster recovery planning:
    • It creates plans for renovation of services after any event of natural calamity.
    • It focuses on technical concerns involved in keeping systems functioning.
    • It denotes back up files as well as maintenance of backup systems or recovery services...

Explanation of Solution

Security problems in cloud computing:

  • The company needs to make sure data protection at a level that meets requirements of corporate.
  • The company stipulates to cloud provider for data storage based on privacy rules.
  • The encryption mechanism of cloud provider should be verified by company...

Explanation of Solution

Measures to improve software quality and reliability:

  • The measures for improving software quality and reliability are shown below:
    • Software metrics:
      • It denotes objective assessments of system in from of quantified measurements.
      • It allows department of information systems and end users for combined measure of system performance.
      • It helps to recognize problems that occur.
      • The metrics must be designed carefully and should have consistent usage.
      • The examples of software metrics includes:
        • Count of transactions processed within a particular time.
        • Online response time.
        • Count of bugs per hundred lines of code...

Blurred answer
Students have asked these similar questions
(Short-answer) b. Continue from the previous question. Suppose part of the data you extracted from the data warehouse is the following.   Identify the missing values you think exist in the dataset. Use Column letter and Row number to refer to each missing value in the dataset. Please write down how you want to address each particular missing value (you can group them if they receive same treatment). For imputation, you do not need to calculate the exact imputed values but just describe what kind of value you want to use to impute.
Please original work Locate data warehousing solutions offered by IBM, Oracle, Microsoft, and Amazon Compare and contrast the capabilities of each solution and provide several names of some organizations that utilize each of these solutions. Please cite in text references and add weblinks
Need Help: Which of the following statements about confusion matrix is wrong A) Confusion matrix is a performance measure for probability prediction techniques B) Confusion matrix is derived based on classification rules with cut-off value 0.5 C) Confusion matrix is derived based on training partition to measure a model’s predictive performance D) None of the above
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education