Contractor being a serious threat to their organization’s information systems: Contractor is a kind of employee who is related to the main part of the organization or project. In an organization, a contractor can be a service provider or hardware provider. The reasons for considering a contractor as a serious threat to their organization’s information system are as follows: The insider contract employees will be having a better understanding about the modules such as Id, password, database, etc. Therefore, this information can be stolen by them for further use or someone else. Insiders have a good knowledge in coding as well as in the operation of altering. That is the reason why the company uses limited access to the contractor employee for security reasons. To reveal the information, there are chances that the hacker or attacker may give bribe to a contract employee...

BuyFind

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168
BuyFind

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168

Solutions

Chapter 14, Problem 6RQ

Explanation of Solution

Contractor being a serious threat to their organization’s information systems:

Contractor is a kind of employee who is related to the main part of the organization or project. In an organization, a contractor can be a service provider or hardware provider.

The reasons for considering a contractor as a serious threat to their organization’s information system are as follows:

  • The insider contract employees will be having a better understanding about the modules such as Id, password, database, etc. Therefore, this information can be stolen by them for further use or someone else.
  • Insiders have a good knowledge in coding as well as in the operation of altering. That is the reason why the company uses limited access to the contractor employee for security reasons.
  • To reveal the information, there are chances that the hacker or attacker may give bribe to a contract employee...

Expert Solution

Want to see the full answer?

Check out a sample textbook solution.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.