Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8.1, Problem 1CQ1
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Blurred answer
Students have asked these similar questions
If there was no system of checks and balances or mandated time off, what security measures would be put in place to reduce malicious attacks?
If there was no system of checks and balances or mandatory vacation regulations, what security plan might be implemented to reduce malicious attacks?
Select two non-consecutive chapters, other than Chapter 1) that specify a social engineering attack from Kevin Mitnick's book The Art of Deception and discuss why the exploit worked and what the victims should have done differently (risk mitigation or defense strategies) to mitigate the loss.  Compare the different exploits used in the two chapters.  Why was each exploit chosen for that specific situation? Be sure to list the chapter numbers you are using.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,