Essentials of MIS (12th Edition)
Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 9HMP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Platform to address:

  • First platform:
    • o The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • o The core system operations are affected by task of administrators.
  • Second platform:
    • o The windows server with corporate applications denotes second platform.
    • o The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • o The Sun Solaris with e-commerce and web servers denote third platform.
    • o The internal operations are ensured to be safe and secure...

Explanation of Solution

Types of control problems:

  • The types of control problems includes:
    • o General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • o Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by information systems.
  • The top priority should be given system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
What's wrong with my pseudocode?            // The calcDiscountPrice function accepts an item’s price and             // the discount percentage as arguments. It uses those             // values to calculate and return the discounted price.             Function Real calcDiscountPrice(Real price, Real percentage)                         // Calculate the discount.                         Declare Real discount = price * percentage                           // Subtract the discount from the price.                         Declare Real discountPrice = price – discount                           // Return the discount price.                         Return discount             End Function
Need help converting my pseudocode to python, AND have a flowchart showing everything!The code: Function getScore()    // Prompt the user to enter a test score    Display "Enter a test score as a percentage (0-100): "    Input score    // Return the score entered by the user    Return scoreEnd Function Function getGPAPoint(Integer score)    // Determine GPA point based on the score    If score >= 90 Then        Return 4.0    Else If score >= 80 Then        Return 3.0    Else If score >= 70 Then        Return 2.0    Else If score >= 60 Then        Return 1.0    Else        Return 0.0    End IfEnd Function Function getAverage()    // Initialize variables to store the sum of scores and GPA points    totalScore = 0    totalGPA = 0.0        // Loop to collect 5 test scores    For i = 1 to 5 Do        score = getScore() // Call getScore function to get a test score        totalScore = totalScore + score // Add score to totalScore        gpaPoint = getGPAPoint(score) // Convert…
Where did I make an error in my pseudocode module???Code:Module main()                 Call raiseToPower(2, 1.5)            End main              Module raiseToPower(Real value, Integer power)                 Declare Real result                 Set result = value ^ power                 Display result            End raiseToPower
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage