EBK ESSENTIALS OF MIS
EBK ESSENTIALS OF MIS
12th Edition
ISBN: 8220101459305
Author: LAUDON
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 8HMP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Impact on business:

  • A risk assessment is to be performed to determine impact on business.
  • The value of information assets, vulnerability ...

Explanation of Solution

Steps to prevent damage:

  • The steps taken to prevent website damages includes:
    • o Access controls:
      • It prevents improper access to system of organization.
      • The unauthorized users would be restricted using this method.
    • o Firewalls:
      • It prevents access of private networks from unauthorized users.
    • o Intrusion detection systems:
      • The monitoring tools are placed at most vulnerable points, It detects and deters intruders for system.
    • o Antivirus program:
      • The software program that checks systems and drives for presence of virus...

Blurred answer
Students have asked these similar questions
using r language
using r language
You are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning