Connect with LearnSmart Access Card for Business Driven Technology
Connect with LearnSmart Access Card for Business Driven Technology
7th Edition
ISBN: 9781259852183
Author: Paige Baltzan, Amy Phillips
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 7, Problem 6MBD

Explanation of Solution

Importance of securing data:

It is important to secure data because:

  • Securing data prevents the compromise or loss of data contained in the database, an event which could have serious ramifications for any company.
  • Securing data block attacks from unauthorized users or hackers which prevents the loss of sensitive information.
  • Securing data prevents malware infections and stop viruses stealing data.
  • Securing data ensures that physical damage to the server doesn’t result in the loss of data.
  • Securing data prevents data loss through corruption of files or programming errors.

Customer data hacking:

Following are the things that can happen when someone accesses the customer database:

  • They can spend all the money: If someone manages to steal financial information from the user, then they can drain the bank accounts, drain your credit and debit cards, and quickly deposit all of the money into their accounts in no time at all.
  • They can put the safety of the user and user’s family at risk: If someone was able to access addresses, phone numbers, drivers license numbers, passport numbers and PO Box addresses then they can put the physical safety of user and user’s family at risk.
  • They can kill credit rating: When someone has user’s bank account and credit card details, the damage they can do to the users financial state is incredible.

Changing information in customer data:

When someone changes information in customer data are:

  • Personally identifiable information is defined as data that can be used to identify, locate, or contact a specific individual and when hacker changes information then attackers can often go for malicious attacks that impact the victim directly, by applying for loans or credit cards under the user’s name, filing fraudulent income tax returns, and applying for loans under the victim’s name.
  • Financial information such as banking information, billing accounts, insurance information and other data that can be used to access accounts or process financial transactions which when manipulated could greatly impact a user’s finances...

Blurred answer
Students have asked these similar questions
Your employer has just implemented a new security policy that requires all workers to utilize fingerprint readers, rather than their login and password, whenever they use company-issued computers. In an effort to access your account over the weekend, you sliced your finger while entering your password. The result is that your fingerprint cannot be read by the computer. You can't use the computer right now because of this issue. What do you see in store for yourself down the road?
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:   Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions:  The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute  for a TOTAL video…
Chris, your roommate, uses your computer in the middle of the night as you sleep. When you go to sleep at night, your roommate Robin steals your vehicle and drives it around for a bit until you wake up. (Neither has your consent, nor does it do harm to you.) Make a list of the features of the two occurrences that are comparable to one another (characteristics related to the effects of the events, ethics, legality, risks, etc.). Make a list of the features of the two occurrences that are distinct from one another. Which of the following would you find more offensive? Why?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning