Management Information Systems, 12e (Laudon)
Chapter 8 Securing Information Systems
1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.
Answer: TRUE
Diff: 1 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Answer: TRUE
Diff: 2 Page Ref: 294
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
Answer: TRUE
Diff: 2 Page Ref: 295
AACSB: Use of IT
CASE: Comprehension
Objective: 8.1
4) The
…show more content…
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A
Diff: 2 Page Ref: 293
AACSB: Use of IT
CASE: Comprehension
Objective: 8.3
22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization 's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
A) "Legacy systems"
B) "SSID standards"
C) "Vulnerabilities"
D) "Controls"
Answer: D
Diff: 2 Page Ref: 293
AACSB: Use of IT
CASE: Comprehension
Objective: 8.3
23) Which of the following does not pose a security threat to wireless networks?
A) broadcasted SSIDs
B) scannability of radio frequency bands
C) SQL injection attacks
D) geographic range of wireless signals
Answer: C
Diff: 1 Page Ref: 295-296
AACSB: Analytic Skills
CASE: Evaluation in terms of assess
Objective: 8.1
24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.
B) are not secure because the technology to secure them did not exist at
Computers make it easy for information to get around more rapidly just as cell phones do. Emails can be sent two hundreds of people within a matter of minutes; however, this can be harmful if an individual uses it to do harm rather than good. It can be open to virus, hackers, malware, etc. This can create an environment for unauthorized users to hack into a computer and see confidential information. This is when face-to face communication is still important and better than technology. Computers limit the authentication of a person’s response; it makes t difficult to know who they are talking to, which can raise the risk of security and safety.
* An organisation’s policies and procedures enable staff to work in line with best practice and the law (legislation).
The chances of failures can be decreased by executing the checks on the systems. These keep an eye on the systems preventing risks from occurring, and these checks are avoided as the interior controls. The motivation behind the inner controls is to keep the organization safe from risks associated with the modernized accounting-system risks. Organizations change their manual accounting systems to computerized accounting systems for different reasons, this incorporates the points of interest, and the explanation behind utilizing electronic accounting information is instinct. The organizations embrace the policies of their
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Since there are already huge number of people who are using computer networking in sharing some of their files and resources, your security would be always at risk. There might be illegal activities that will occur that you need to be aware and be careful all the time.
7. Outline the policies, procedures, systems and values of your organisation that are relevant to your role (1.7)
The organisation has established and maintains policies and procedures for information quality assurance and the effective management of
To manage and maintain safe working practices, management should carry out quality checks (quality assurance) and audits against these standard operating procedures. Checks or audits may be carried out:
Dissemination can have problems such as the various intelligence and information records systems, privacy issues, information system, security issues, operations security of shared information, the means of dissemination, interoperability issues. (Carter, 2008, Pg. 69)
Internet could be used by rivals or criminals just as a mean to access such information. If consider such fact that almost any organization today uses Internet as it uses telephone, the scales of the issue become global.
Malfunction: software malfunction is mostly caused by poor development practices where security has not been built in the software development life cycle but rather incorporated at a latter phase when the software is already fully developed. By doing this, most of the vulnerabilities won’t be handled which latter leads to either crash or malfunctioning of the software, whereby the attacker has an easy time breaking into the system and causing damage or customer’s data disclosure.
The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or "destroy" data stored on the infected computer. Viruses, that destroy data, write their code into a file and when that file is accessed it rewrites itself in to more files until the virus corrupters or "infects" a file that the computer needs to run
My webpage was centralized around the idea of social media integration into businesses/companies. This was a great topic to analyze and develop on because as the modern world keeps developing, we have become more dependent on other media outlets to provide opinions and brand support. My idea was to create a place, where people who have a hard time understanding the linguistics of business and media can break down the strategies in a simpler context. This web page will help diffuse any fears companies have about integration. Like my mission statement says, “The constant connection has set out to help modernize businesses and corporations with the integration of social media. The constant connection promises to bring its readers up to date information on modern marketing strategies to boost profits in their businesses.”
Security, There are numerous security threats to your computer, in other words many types of malware, which is short for malicious software. This includes computer viruses, which can interact with the normal operations of your computer. Viruses can be very harmful and result in loss of data or system crashes. The OS of a computer has a number of built-in tools to protect against security threats, including the use of virus scanning utilities and setting up a firewall to block unsafe network activity. One of the most common ways to get a computer virus is by e-mail. If you have received an e-mail message from someone you don 't
In today’s highly connected digital ecosystem, our lives, businesses, communications, and a lot of activities depend on the websites and web applications. All websites contain sensitive data and deliver business-critical information services to the targeted audience. Due to the rapidly increasing use of websites and web applications, vulnerabilities have become quite rampant. Even the smallest security loophole can give cybercriminals a chance to destroy the web-based business, damage customer confidence, and brand reputation in a short time span.