Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8.4, Problem 1CQ2
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider the information that is saved on your computer's hard disc. Do you need immediate access to confidential information that is saved on your computer? What possible repercussions may result from such information being stolen or misplaced? What are some helpful precautions you may take to safeguard your device?
Take a peek at your computer's files. Is there anything on your computer that is personal to you? Suppose that information was stolen or lost. What would happen to you? In order to keep your computer safe, what are the recommended practises?
Phishing emails may terrify you into thinking your personal or financial information has been taken. Remember this.
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- INSTRUCTIONS: Conduct some independent research using scholarly or practitioner resources that will answer the following statements below. Exercises: 1. Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication. 2. What are some of the latest advances in encryption technologies? 3. What are some of the password policy you have encountered? Do you have to change passwords every so often? What are the minimum requirements for a password? 4. How are you doing on keeping your own information secure?arrow_forwardThink about the data stored on your computer's hard drive. Do you have sensitive data that you need instantaneously access on your computer? How dire would the consequences be if that data were stolen or lost? How do you best protect your machine?arrow_forwardWhat are the steps you can take if your WordPress file is hacked?arrow_forward
- If you had reason to believe that anyone was attempting to get into your computer, where would you begin your investigation?arrow_forwardExplain the concept of "jailbreaking" in the context of mobile devices. What are the implications and risks associated with it?arrow_forwardExamine the hard disc of your computer. Is it just you using the computer? The data was either misplaced or stolen. What transpires? What are the best practises when it comes to computer security?arrow_forward
- Consider the information that's saved on the hard disc of your computer. Do you have private information on your computer that you need access to right this second? How catastrophic would the loss of such information be? How can you ensure the safety of your device?arrow_forwardDo you think it should be unlawful to try to hack into (that is, get access to or use of) a computer device without permission? Why do you think that is the case?arrow_forwardTake a check at your computer's hard drive. Is there anything on your computer that is personal to you? Suppose that information was stolen or lost. What would happen to you? In order to keep your computer safe, what are the recommended practises?arrow_forward
- Think about the information now stored on your computer's hard drive. Do you need immediate access to sensitive information stored on your computer? What are the potential repercussions of having such information stolen or lost? How do you be sure your electronic device is safe?arrow_forwardTo increase security, your company now requires employees to sign into their computer account using a fingerprint reader instead of entering a username and password. This past weekend, you cut the finger you ise to sign in, and your computer now does not recognise your fingerprint. As a result, you are unable to access your computer. What are you next steps?arrow_forwardThe act of encrypting data is referred to as "salt" in the field of cryptography. You must explain how it is used to make passwords more difficult to guess.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning