Connect with LearnSmart Access Card for Business Driven Technology
Connect with LearnSmart Access Card for Business Driven Technology
7th Edition
ISBN: 9781259852183
Author: Paige Baltzan, Amy Phillips
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 17, Problem 4MBD

Explanation of Solution

Importance of securing data:

  • Leaked data could have serious consequences for employees and public.
  • Privacy breaches leads to fines, bas press, reputation damage and loss of trust.
  • The residents’ personal information should be protected.
  • Breaching data protection act may lead to huge fines and it cannot protect job.

Accessing customer database:

  • If customer database is been accessed by someone then name as well as other personal information are stolen.
  • This private information could be used for fraudulent purposes.
  • This information is misused to apply for credit cards, driver’s licenses and other documents.
  • This may destroy credit for person and it will reflect in loan schemes of person.
  • The social security numbers may reveal entire personal data of person.
  • The hackers may even update information for fraudulent activities.

Changing data in customer database:

  • If data in customer database is updated then it creates serious issues.
  • If new data is been added to violent offenders list illegally then it affects innocent people.
  • It may result in facing of legal procedures for the innocent people in customer database...

Blurred answer
Students have asked these similar questions
What are the key considerations in software product security, and how can organizations mitigate security risks and vulnerabilities throughout the software development lifecycle?
Discuss the challenges and solutions related to security in software development, including topics like code vulnerabilities, penetration testing, and secure coding practices.
Discuss the importance of secure coding practices in software development. What are some common security vulnerabilities, and how can developers mitigate them during the development process?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning