EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8HMP
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Impact on business:
- A risk assessment is to be performed to determine impact on business.
- The value of information assets, vulnerability ...
Explanation of Solution
Steps to prevent damage:
- The steps taken to prevent website damages includes:
-
o Access controls:
- It prevents improper access to system of organization.
- The unauthorized users would be restricted using this method.
-
o Firewalls:
- It prevents access of private networks from unauthorized users.
-
o Intrusion detection systems:
- The monitoring tools are placed at most vulnerable points, It detects and deters intruders for system.
-
o Antivirus program:
- The software program that checks systems and drives for presence of virus...
-
o Access controls:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?
Task: Research Network Security Attacks
Each student will search using Internet resources including Cisco NetAcad for the following
information about the network security attacks as given in the table below.
You should add figures to support your explanation.
Answer each of the following questions for the type of security attack provided in the table
below:
1. What is that type of attack?
2. Discuss different types of that attack, if any.
3. How each type of that attack effects the network and users?
4. Give at least five security recommendations to control and prevent that attack.
(Malware (Virus, Worm, Trojans))
LET'S ANALYZE TEXT AND VISUAL INFORMATION
DIRECTION: Study the visual information below and answer the following questions briefly. Write your
answer in your activity sheet.
X
HACKER
SCANNING
BRUTEFORCE
Source:
FIREWALL
CRACKING
TROJAN HORSE
https://www.alamy.com/stock-
photo-internet-security-flat-
icon-set-for-flyer-poster-web-
site-like-hacker-87255828.html
STATEMIRROR
PIST
SPAM
VIRUS
PROTECTION
1. What is/are the content/s of this visual media? Explain in 2-3 sentences only.
2. What do you think is the purpose/intention of this visual media? Explain in 2-3 sentences only.
How is this visual media disseminated to people? Explain in 2-3 sentences only.
VOICING OUT MY THOUGHTS
DIRECTION: In your own understanding/opinion, how can multimedia be of help in the following
industries? Explain your answer in 2-3 sentences each. (15pts)
2. Engineering and Infrastructure
3. Fashion Industry
STOP
U
Knowledge Booster
Similar questions
- Analyze the security challenges and vulnerabilities faced by the Internet, including DDoS attacks, phishing, and data breaches.arrow_forwardTo keep in touch with friends, family, and coworkers, people of all ages use social networking sites like Facebook and Twitter. The risks of revealing a large quantity of personal information on social networks are often underestimated by users. What role does social networking play in social engineering attacks?Personal and private information is increasingly at risk from cyberattacks.arrow_forwardImagine that you are in charge of developing a fast-growingeducational startup’s e-commerce presence. What do you think are the 5 most potentially damaging types of attacks aimed at us?arrow_forward
- Explore the challenges and solutions in achieving secure Software-Defined Networking (SDN), including the prevention of SDN-based attacks.arrow_forwardPlease I need to answer this question. The book's name is: "Network Security, Firewalls, and VPNS, 2e". Thank you. Question: What are some of the importance of user training and awareness? Should the training remain static or should it be continuously ongoing?arrow_forwardDiscuss the challenges and solutions related to internet security, including topics such as DDoS attacks, encryption protocols, and cybersecurity best practices.arrow_forward
- All hackers would want to get their hands on a web server. Talk about the numerous safety precautions that may be used to prevent the attacks.arrow_forwardIt is a common practice to place Web servers in the DMZ (demilitarized zone) which can make them a target for hackers. What would you do to protect your Web servers? Name three vulnerabilities you would guard against.arrow_forwardCan i please get help with this question: This is all the information needed for the question...I would really appreciate the help..You can just google the sites yourself you dont have to use the link SOURCES TO HELP WITH QUESTION. Review some of the recent threat reports from the key relevant sources such as: You can type the reports listed below into google to get the articles. IC3 2020 CRIME REPORT: AND ASEAN CYBER THREAT ASSESSMENT 2021 INTERPOL: QUESTION identify any additional new threat vectors that you found from these recent surveys. (What were the main threat vectors, which were continuing trends and which were new ).arrow_forward
- Discuss the development of web-based attacks from 2009-2015, you are to write a report and show the development of these attacks, The following sections should be included in the report:IntroductionWeb based attack developmentSolutionsExpected future trendarrow_forwardWhat are your thoughts on whether or not Facebook and other social media platforms should provide law enforcement access to user accounts in order to conduct investigations? For what purpose is this inquiry being made? Is it fair that law enforcement agencies can't access the accounts of people who use social media like Facebook? Why would you ever ask such a thing?arrow_forwardConsider the specific measures you would take to defend yourself against web application attacks.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you