menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you are the database administrator for a corporation with a large data base that is accessible from the Web. What steps would you implement to prevent people from stealing personal information from the corporate database?

BuyFindarrow_forward

Fundamentals of Information Systems

8th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305082168
BuyFindarrow_forward

Fundamentals of Information Systems

8th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305082168
Chapter 3, Problem 12DQ
Textbook Problem
5 views

Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you are the database administrator for a corporation with a large data base that is accessible from the Web. What steps would you implement to prevent people from stealing personal information from the corporate database?

Program Plan Intro

Steps one would implement to prevent people from stealing personal information from the corporate database.

Explanation of Solution

Given information:

Assume that you are the database administrator for a corporation with a large database that is accessible from the web.

Explanation:

Securing data is important because it contains information on the business activities, and sometimes data also contains critical information of customers, suppliers, and strategic partners. Such information if lost or stolen could lead businesses to bankruptcy or may direct business to end all activities. Securing data is important to maintain the confidentiality of the business and prevents it from any theft internal or external. If someone who is not authorized to access the business's customer database and gain access to it, then the individual could harm business by stealing customer information. Usually, when businesses are victims of customer data theft, they lose reputation in the customer's eye and the potential investor and customers too.

Steps that would prevent people from stealing personal information from the corporate databases are:

  • Authentication and authorization- Authentication is the process of determining user identity to confirm access to the system. Once the authentication is approved, it can then determine the access authorization of the system. Authorization is the process of giving permission to user, including access level and hours of access.
  • Prevention and resistance-Content filtering software filters emails, incoming and transactions to prevent any malicious transmission of unauthorized information...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 3 Solutions

Fundamentals of Information Systems
Show all chapter solutions
add
Ch. 3 - Draw an entity-relationship diagram for the tables...Ch. 3 - How accurate do you think sentiment analysis is?...Ch. 3 - ______________ is a skilled and trained IS...Ch. 3 - A collection of data fields all related to one...Ch. 3 - Multiple records can have the same primary key....Ch. 3 - A(n) _______________ is a field or set of fields...Ch. 3 - A(n) ________ is a diagram of entities and their...Ch. 3 - The __________________ is a simple but highly...Ch. 3 - _______ involves eliminating columns in a a....Ch. 3 - Because the DBMS is responsible for providing...Ch. 3 - _______________ is a special purpose programming...Ch. 3 - SQL databases conform to ACID properties that...Ch. 3 - A(n) _____________ is a collection of instructions...Ch. 3 - The ________________ is a nontechnical, but...Ch. 3 - A trend in database management, known as Database...Ch. 3 - ____________ is a term used to describe data...Ch. 3 - An in-memory database (IMDB) is a database...Ch. 3 - A(n) _____________ is a database that holds...Ch. 3 - An information-analysis process that involves the...Ch. 3 - _______________ allows users to explore data from...Ch. 3 - ____________ is a form of data mining that...Ch. 3 - _______________ is a data visualization technique...Ch. 3 - How would you define the term “database”? How...Ch. 3 - In the hierarchy of data, what is the difference...Ch. 3 - What is meant by the database approach to data...Ch. 3 - What is meant by data archiving? Why is this an...Ch. 3 - What is an entity-relationship diagram, and what...Ch. 3 - Identify four basic data manipulations performed...Ch. 3 - What is data scrubbing?Ch. 3 - What is database as a service (DaaS)? What are the...Ch. 3 - What is Hadoop? What are its primary components,...Ch. 3 - What is Hadoop?Ch. 3 - What is schema, and how is it used?Ch. 3 - What is concurrency control? Why is it important?Ch. 3 - What is in-memory database processing, and what...Ch. 3 - What is the difference between projecting and...Ch. 3 - What is big data? Identify three characteristics...Ch. 3 - What is a data warehouse, and how is it different...Ch. 3 - What is meant by the “front end” and the “back...Ch. 3 - What is the relationship between the Internet and...Ch. 3 - What is data mining? What is OLAP? How are they...Ch. 3 - What is business intelligence? Identify five...Ch. 3 - What is predictive analysis? Give an example where...Ch. 3 - When building a database, an organization must...Ch. 3 - Outline some specific steps an organization might...Ch. 3 - 3. Briefly describe the ACID properties to which...Ch. 3 - Briefly describe how a NoSQL database operates.Ch. 3 - Identify and briefly describe some of the...Ch. 3 - Identify and briefly describe the steps in the ETL...Ch. 3 - You are the vice president of information...Ch. 3 - What counter-intelligence strategy might a large...Ch. 3 - Your luxury car dealership wants to identify...Ch. 3 - Make a list of the databases in which data about...Ch. 3 - If you were the database administrator for the...Ch. 3 - Identity theft, where people steal personal...Ch. 3 - You have been hired to set up a database for a...Ch. 3 - Develop a simple data model for a student database...Ch. 3 - An online video movie rental store is using a...Ch. 3 - To improve service to their customers, the workers...Ch. 3 - Using a graphics program, develop an...Ch. 3 - Use a Web search engine to find information on...Ch. 3 - Do research to find three different estimates of...Ch. 3 - Do research to find what career opportunities are...Ch. 3 - How could you use business intelligence (BI) to do...Ch. 3 - How did Medihelp’s use of a traditional database...Ch. 3 - How does Medihelp’s Salesforce now USC the...Ch. 3 - How did B.I. Practice improve the efficiency of...Ch. 3 - How does the new query system help Medihelp make...Ch. 3 - From the user side, Mr. Kim said that HanaTour...Ch. 3 - How does HanaTour use the data it collects from...Ch. 3 - HanaTour chose Wizbase as its implementation...Ch. 3 - Think of the data that your university’s database...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What activities are encompassed by supply chain management?

Principles of Information Systems (MindTap Course List)

VocabularyState the meaning of the following terms: Ampere _____ Direct current _____ Alternating current _____...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What is a common problem in calculating start and finish times? Provide an example.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

Describe uses of technology in the entertainment industry.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Name three items that are manufactured using welding.

Welding: Principles and Applications (MindTap Course List)