As the project manager of the development project, educate the owner of Vegan Garden on the security concerns regarding the information systems. Explain ANY FIVE (5) common security threats affecting information systems.     Elaborate on the security measures for the FIVE (5) threats mentioned previously

Principles of Information Systems (MindTap Course List)
13th Edition
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter12: System Acquisition And Development
Section: Chapter Questions
Problem 3TA: You and your team have been hired to perform a system investigation for a fast food restaurant that...
icon
Related questions
Question

The Vegan Garden is a small restaurant in the quiet city of Dawnsville. The restaurant has been operating for the past five years. Currently manual systems such as cash registers are being used for capturing sales and old filing cabinets are used for storing the sales reports for each month and other business documents such as employee and supplier information. The owner of Vegan Garden has decided to implement an information system. He sought the services of an IT company to build an information system that would align to the current business processes of the Vegan Garden.

You are the appointed project manager for the development of the Vegan Garden information system.

 

 

As the project manager of the development project, educate the owner of Vegan Garden on the security concerns regarding the information systems. Explain ANY FIVE (5) common security threats affecting information systems.

 

 

Elaborate on the security measures for the FIVE (5) threats mentioned previously

 

Expert Solution
Basics
  • Threat can be whatever can exploit a weakness to break security and contrarily change, eradicate, hurt article or objects of interest.
  • Programming assaults implies assault by Viruses, Worms, Trojan Horses and so forth.
  • Malware is a blend of 2 terms-Malicious and Software. So Malware fundamentally implies pernicious programming that can be a nosy program code or an anything that is intended to perform noxious procedure on framework. Malware can be partitioned in 2 classifications:
    • Infection Methods
    • Malware Actions
  • A digital threat is a malevolent assault that increases unapproved admittance to a framework or network and in this way harms or takes the secret information of the client.
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Data Modeling Concepts
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage