Located in Dawnsville, a quiet village, the Vegan Garden is a small restaurant that serves vegan fare. Since it opened five years ago, the restaurant has been open for business. Cash registers are still used to record sales and old file cabinets are still used to keep monthly sales reports and other corporate paperwork, such as employee and supplier information. There is an information system in place at Vegan Garden, which is why its owner has decided to implement it. An information technology company was hired to help him design an information system that would be consistent with the Vegan Garden's current business practises. You've been given the task of overseeing the construction of the Vegan Garden's information system.   Teach the proprietor of Vegan Garden about the dangers of an insecure computer system as the project manager for the development effort. Any five (5) of the most common security threats to information systems may be listed here.

Information Technology Project Management
9th Edition
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Kathy Schwalbe
Chapter11: Project Risk Management
Section: Chapter Questions
Problem 1E
icon
Related questions
Question

Located in Dawnsville, a quiet village, the Vegan Garden is a small restaurant that serves vegan fare. Since it opened five years ago, the restaurant has been open for business. Cash registers are still used to record sales and old file cabinets are still used to keep monthly sales reports and other corporate paperwork, such as employee and supplier information. There is an information system in place at Vegan Garden, which is why its owner has decided to implement it. An information technology company was hired to help him design an information system that would be consistent with the Vegan Garden's current business practises.

You've been given the task of overseeing the construction of the Vegan Garden's information system.

 

Teach the proprietor of Vegan Garden about the dangers of an insecure computer system as the project manager for the development effort. Any five (5) of the most common security threats to information systems may be listed here.

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning