Essentials of MIS (12th Edition)
Essentials of MIS (12th Edition)
12th Edition
ISBN: 9780134238241
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 9HMP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Platform to address:

  • First platform:
    • o The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • o The core system operations are affected by task of administrators.
  • Second platform:
    • o The windows server with corporate applications denotes second platform.
    • o The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • o The Sun Solaris with e-commerce and web servers denote third platform.
    • o The internal operations are ensured to be safe and secure...

Explanation of Solution

Types of control problems:

  • The types of control problems includes:
    • o General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • o Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by information systems.
  • The top priority should be given system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
# Find the error# Why will the following code not print out a list of contact namesphoneBook = {'Doe, Jane' : '843-000-0000' ,'Doe, John' : '843-111-1111' ,'Smith, Adam' : '843-222-2222' ,'Jobs, Steve' : '999-333-3333' ,}for contact in phoneBook.values():print(contact)
# Find the error:# The following code creates an empty dictionary and attempts to add a record# Why will the following code not create a new dictionary entry as intended?phoneBook = {}phoneBook{'Jobs, Steve'} = '999-111-1111'
Select all the possible polar representations of the vector that is obtained from rotating where by Zrot Ź x = 3e² T= 3п 8 Hint: Consider the negative angle that is equivalent to the positive angle of the rotated vector. 0
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage