Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 10.9, Problem 10.9ARQ

Explanation of Solution

The opinion of authors regarding cyberwarfare in the next 10 years:

Cyberwarfare is a technical conflict with national disaster. According to authors, human errors and natural disaster errors are constant. Because, human error cannot be changed and natural disaster never estimated.

Most organization will set up their sites and data’s in well-prepared clouds. Other than human error and natural disaster there will be threat is known as APT (Advanced Persistent Threat).

  • Note: APT is a network attack from unauthorized person for long time. The goal of APT is damage the network of the organization.
  • In author point of view, there is some new APT’s can affected on organization that will cause a serious damage.

Cat and mouse:

Hackers search the vulnerability to attack an organization and they exploit it.

  • Experts of computer security provide the safeguard then the hackers find the new type of vulnerability and experts exploit it.
  • This type of process looks like a cat and mouse in computer crime evaluation.
  • For the next ten year, it will be continued as cat and mouse game...

Blurred answer
Students have asked these similar questions
Q.5.2 Argue for and against the establishment of legislations such as the Protection ofPersonal Information.Q.5.3 Your classmates have been distributing messages via WhatsApp thatdiscriminate against certain people. Referring to the draft cybercrimes andcybersecurity bill, what would be the consequences (if any) for the above act?
QUESTION 1 1. Differentiate between digital natives and digital immigrants. 2. Discuss the three ways that technology can be abused by individuals. 3. What are (cyber)deviance, cybercrime, and cyberterrorism?  QUESTION 2 1. Differentiate between nation-state and non-nation-state hackers. 2. List three key norms and values of the hacker subculture.3. Identify the various terms used to define and differentiate hackers. 4. Discuss the common types of scans.  QUESTION 3 1. How does a Virus Scanner work? 2. What is a spyware? 3. Differentiate between on-demand virus scanners and ongoing virus scanner.4. What are the application gateway, application-level proxy, and application proxy?5. What is the purpose of port scanning? 6. What is the Stateful Packet Inspection (SPI)? QUESTION 4 1. Differentiate between Denial-of-service (DoS) and Distributed Denial of Service (DDoS). 2. Describe the following items:  Flood attack ICMP flood attack UDP flood attack3. How do you protect the…
Question 15 kk    .If public schools were to implement programs to help teach self-control among children at a young age and then continue providing education on how to use technology responsibly, do you think we would see a reduction in cyber crime? Why or why not? Use specific examples from the theory to support your response.  Full explain this question and text typing work only     We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning