Using MIS (9th Edition)
Using MIS (9th Edition)
9th Edition
ISBN: 9780134106786
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 10.9, Problem 10.1ARQ

Explanation of Solution

Information systems security:

System security is to prevent information from unauthorized access. The goals of information systems are to prevent from information violations, identification of the attacks, and response for developing strategies.

Threat:

A threat is a thing that can cause damage to the organization, IT systems or other networks.

Vulnerability:

It is a path for threats to attack a system. It is a way to increase the availability of accessing individual or organizational assets.

Safeguard:

It is a measurement by an individual or organization to protect occurrence of threats. “Encryption” is a method which acts as a safeguard that encrypt the information of the company so that others can’t access the data.

Target:

Target is the output of threats which can be in the form of assets, bank accounts and statements.

Example:

If the user wants to transact amount through online, he/she must provide the bank details like account number and password over the web to access an account.

Threat in above example: The details of an account may be accessed by any intruder without user’s knowledge which leads to loss of information is one of the threats.

Vulnerability in above example: The same example that was mentioned on “threat”, the vulnerable point is the internet point used to access the user information.

Safeguard in above example: Safeguard is a protection shield that hides the user data from illegal access from threats.

Target in above example: The target of the above example is login the bank account by the intruder without user’s permission.

Types of threats:

There are three types of threats in system security. They are as follows:

  • Human error
  • Computer crime
  • Natural disasters

Human error:

Human error is an error which is caused by a single person like employees or customers. For example, if an employee can accidentally removes or edits customer details.

Computer crime:

It is an illegal access by the hacker via internet or web. This crime can install viruses on computers to corrupt systems and hack information.

Natural disasters:

This threat caused due to natural disasters like accidents, floods or earthquakes. It may cause loss of capability and services.

Types of security losses:

There are five types of security losses in system security are as follows:

  • Unauthorized data disclosure
  • Incorrect data modification
  • Faulty service
  • Denial of service(DOS)
  • Loss of infrastructure

Unauthorized data disclosure: The data disclosure is nothing but data was accessed by unauthorized people may result in loss of information. It might occur accidentally or intentionally.

Incorrect data modification: If the data has been modified incorrectly then the data loss occurred in any organization is termed as incorrect data modification...

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education