EBK ESSENTIALS OF MIS
EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 8HMP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Impact on business:

  • A risk assessment is to be performed to determine impact on business.
  • The value of information assets, vulnerability ...

Explanation of Solution

Steps to prevent damage:

  • The steps taken to prevent website damages includes:
    • o Access controls:
      • It prevents improper access to system of organization.
      • The unauthorized users would be restricted using this method.
    • o Firewalls:
      • It prevents access of private networks from unauthorized users.
    • o Intrusion detection systems:
      • The monitoring tools are placed at most vulnerable points, It detects and deters intruders for system.
    • o Antivirus program:
      • The software program that checks systems and drives for presence of virus...

Blurred answer
Students have asked these similar questions
Data Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?
Task: Research Network Security Attacks Each student will search using Internet resources including Cisco NetAcad for the following information about the network security attacks as given in the table below. You should add figures to support your explanation. Answer each of the following questions for the type of security attack provided in the table below: 1. What is that type of attack? 2. Discuss different types of that attack, if any. 3. How each type of that attack effects the network and users? 4. Give at least five security recommendations to control and prevent that attack. (Malware (Virus, Worm, Trojans))
LET'S ANALYZE TEXT AND VISUAL INFORMATION DIRECTION: Study the visual information below and answer the following questions briefly. Write your answer in your activity sheet. X HACKER SCANNING BRUTEFORCE Source: FIREWALL CRACKING TROJAN HORSE https://www.alamy.com/stock- photo-internet-security-flat- icon-set-for-flyer-poster-web- site-like-hacker-87255828.html STATEMIRROR PIST SPAM VIRUS PROTECTION 1. What is/are the content/s of this visual media? Explain in 2-3 sentences only. 2. What do you think is the purpose/intention of this visual media? Explain in 2-3 sentences only. How is this visual media disseminated to people? Explain in 2-3 sentences only. VOICING OUT MY THOUGHTS DIRECTION: In your own understanding/opinion, how can multimedia be of help in the following industries? Explain your answer in 2-3 sentences each. (15pts) 2. Engineering and Infrastructure 3. Fashion Industry STOP U
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
  • Text book image
    MIS
    Computer Science
    ISBN:9781337681919
    Author:BIDGOLI
    Publisher:Cengage
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage