Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8.4, Problem 4EGDQ
a.
Program Plan Intro
Bot army:
- Bot army is a group of computers infected with a malign program through Internet and it can be remotely controllable.
- Mount Denial-Of-Service (DoS) attacks is an example of bot army.
b.
Program Plan Intro
Bot army:
- Bot army is a group of computers infected with a malign program through Internet and it can be remotely controllable.
- Mount Denial-Of-Service (DoS) attacks is an example of bot army.
c.
Program Plan Intro
Bot army:
- Bot army is a group of computers infected with a malign program through Internet and it can be remotely controllable.
- Mount Denial-Of-Service (DoS) attacks is an example of bot army.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Nathan is playing an online video game. He discovers that all the avatars for the games are male. He doesn’t think that this is equitable, so he writes the gaming company and advocates for this to be corrected. What type of bias is Nathan advocating against?
A)confirmation bias
B)framing bias
C)bandwagon effect
D)gender bias
The use of the Internet has evolved to the point where it is now an indispensable instrument for exercising one's right to free speech. It's standard practise for people to use hate speech to spread on social media platforms like Facebook and Twitter. Should there be no restrictions placed on the right to free speech for those who use the internet? The operators of social media platforms need to carefully assess the extent to which they may cut down on the number of negative comments they publish.
Analyze the following scenario: An employee using company resources sends email that is later retrieved when the employee sues the company. Is there a reasonable expectation of privacy? Is it different if the computer used was purchased by the employee but the email was sent during work hours? What additional facts or changes in your assumptions would alter your analysis? Ethically, what are the arguments, pro and con, for an employer monitoring electronic communication?
Chapter 8 Solutions
Using MIS (10th Edition)
Ch. 8.3 - Prob. 1EGFQCh. 8.3 - Prob. 2EGFQCh. 8.3 - Prob. 3EGFQCh. 8.3 - Prob. 4EGFQCh. 8.4 - Prob. 1EGDQCh. 8.4 - Prob. 2EGDQCh. 8.4 - Prob. 3EGDQCh. 8.4 - Prob. 4EGDQCh. 8.4 - Prob. 5EGDQCh. 8.8 - Prob. 1SGDQ
Ch. 8.8 - Prob. 2SGDQCh. 8.8 - Prob. 3SGDQCh. 8.8 - Prob. 4SGDQCh. 8.8 - Prob. 8.1ARQCh. 8.8 - Prob. 8.2ARQCh. 8.8 - Prob. 8.3ARQCh. 8.8 - Prob. 8.4ARQCh. 8.8 - Prob. 8.5ARQCh. 8.8 - Prob. 8.6ARQCh. 8.8 - Prob. 8.7ARQCh. 8.8 - Prob. 8.8ARQCh. 8 - Prob. 8.1UYKCh. 8 - Prob. 8.2UYKCh. 8 - Prob. 8.3UYKCh. 8 - Prob. 8.4UYKCh. 8 - Prob. 8.5UYKCh. 8 - Prob. 8.6CE8Ch. 8 - Prob. 8.7CE8Ch. 8 - Prob. 8.1CS8Ch. 8 - Prob. 8.11CS8Ch. 8 - Prob. 8.12CS8Ch. 8 - Prob. 8.13CS8Ch. 8 - Prob. 8.14CS8Ch. 8 - Prob. 8.15CS8Ch. 8 - Using your answers to these questions, write a job...Ch. 8 - Prob. 8.17CS8Ch. 8 - Prob. 8.18MMLCh. 8 - Prob. 8.19MML
Knowledge Booster
Similar questions
- 2 Name the worksheet Camper 3. You own the copyrights for a new camper. The copyrights will last 8 years You expect end-of-year profits from the camper to be no less than $250.000 eac year. At the end of 8 years, you expect no more profits from copyrights. If you were to sell these copyrights today using a discount rate of 10% for the cash flows, what price will you accept? Show why? Use the appropriate financial function to solve this problem. #N A- B 1 24 € 8 % **1#QEarrow_forwardThe topic of my argumentative essay will be over gun control and the affect firearms have over Americans. I believe that firearms should only be given to police officers, military, and those that are fully qualified with background checks. I believe that this will help reduce the amount of crime, school shootings, and gang violence among Americans, specifically the youth. This topic is very important, especially to us as college students because our school(s) being a public campus could bring the wrong attention. Although I don’t believe that guns should fully be banned in America, I do believe that guns do bring violence and cause us as Americans to not trust one another. My question is do you agree or disagree with this discussion?arrow_forwardIndividuals are ardent supporters of digital social networking sites (such as Facebook and Twitter). Determine why individuals prefer formal to informal social networks, or vice versa. Compile a list of the possible mental health consequences of excessive use of digital social networking sites. Is there ever a concern that we would acquire an addiction to any Internet activity? Locate at least one instance of someone becoming "dependent" on a social networking site or other online activity in a news or journal article.arrow_forward
- Scenario 2 An organization dedicated to reducing spam tries to get Internet service providers (ISPS) in an East Asian country to stop the spammers by protecting their mail servers. When this effort is unsuccessful, the anti-spam organization puts the addresses of these ISPS on its "black list." Many ISPS in the United States consult the black list and refuse to accept email from the blacklisted ISPS. This action has two results. First, the amount of spam received by the typical email user in the United States drops by 25 percent. Second, tens of thousands of innocent computer users in the East Asian country are unable to send email to friends and business associates in the United States. Questions 1. Did the anti-spam organization do anything wrong? 2. Did the ISPS that refused to accept email from the black listed ISPS do anything wrong? 3. Who benefited from the organization's action? 4. Who was hurt by the organization's action? 5. Could the organization have achieved its goals…arrow_forwardTell us what you think about whether or not social media platforms like Facebook should provide law enforcement access to user accounts. When posed, this sort of question begs the question: why? Is it OK that social media companies like Facebook let police access user accounts to conduct investigations? The point of asking such a thing is unclear.arrow_forwardDigital social networks have a huge following among individuals (such as Facebook and Twitter). Find out why individuals prefer digital social networking over informal social networking, and the opposite is also true. Determine why. Write out all the mental health problems that may arise from using digital social networking sites in excess. Are there any legitimate concerns about being addicted to online pursuits? Try to find a news or journal story where a person was "addicted" to using a social networking site or another online activity.arrow_forward
- Phishing is one kind of electronic con artistry, and it is possible to combine it with spoofing and a number of other methods. Other methods may also be utilised. Phishing may also be used on its own by alone. What are the most effective preventive measures that can be taken to stop fraudulent activities like phishing and spoofing from happening, and how can these measures be taken?arrow_forwardPeople are great lovers of digital social networks (such as Facebook and Twitter). Find out why individuals choose digital social networks over informal social networks, or vice versa. Make a list of the probable mental health consequences of excessive use of digital social networking sites. Do we ever have to be concerned about being addicted to any Internet activity? Find at least one example of someone being "dependent" on a social networking site or other online activity in a news or journal article.arrow_forwardAn organization dedicated to reduce spam tried to get Internet Service Providers (ISP's) in Asian country to stop spammers by protecting their mail servers. When this effort was unsuccessful, the anti-spam organization put the address of these ISP'son its “black list". Many ISP's in the Philippines consulted the black list and refused to accept email from the blacklisted ISP's. This action had two results. First, the amount of spams received by the typical email user in the Philippines dropped by 25 percent. Second, ten of thousands of innocent computer users in the East Asian country were unable to send email to friends and business associates in the Philippines. Lifted from Lavina, C.G. (2015). Social, Ethical, Legal and Professional Issues in Computing with complete explanation of the Philippine. Manila: Cybercrime Laws. Mindshapers Co., Inc Answer the following questions. 1. Did the anti-spam organization do anything wrong? 2. Did the ISP's that refused to accept email from the…arrow_forward
- People appreciate using digital social networks a lot (such as Facebook and Twitter). Learn why people choose formal social networks over informal ones, or the opposite. Make a list of the likely effects that excessive usage of online social networking sites will have on mental health. Do we ever need to worry about developing an addiction to any online activity? In a news or journal article, locate at least one instance of a person becoming "dependent" on a social networking site or other online activity.arrow_forwardWe will be able to find IoT examples in all parts of our lives. Use online search to identify a concrete example of an IoT system (existing or futuristic) in each of the following application areas: home, healthcare, transportation, and community (i.e., four examples in total). For each example, provide a description of what the problem is that the IoT solves, how it solves it, who the users are, and what a risk of the example is (e.g., in terms of ethical concerns, privacy, safety, etc.).arrow_forward1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk? 2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? 3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning