menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

“Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras, and PDAs, such as BlackBerries and Treos, to download data and remove it from an organization’s premises.” Do you agree? Describe some controls from this chapter that might be applied to reduce the risk of data disclosure and loss for these devices.

BuyFindarrow_forward

Pkg Acc Infor Systems MS VISIO CD

10th Edition
Ulric J. Gelinas
Publisher: CENGAGE L
ISBN: 9781133935940

Solutions

Chapter
Section
BuyFindarrow_forward

Pkg Acc Infor Systems MS VISIO CD

10th Edition
Ulric J. Gelinas
Publisher: CENGAGE L
ISBN: 9781133935940
Chapter 8, Problem 11DQ
Textbook Problem
15 views

“Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras, and PDAs, such as BlackBerries and Treos, to download data and remove it from an organization’s premises.” Do you agree? Describe some controls from this chapter that might be applied to reduce the risk of data disclosure and loss for these devices.

Summary Introduction

To discuss: Whether you agree on the above statement and describe some controls that might reduce the risk of data disclosure and loss from these devices.

Explanation of Solution

Given statement:

“Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras and PDA’s Product I to download data and remove it from an organization’s premises.”

Discussion of the statement and controls that might reduce the risk of data disclosure and loss from these devices:

Person X agrees on the statement that it has become a tedious job to secure the information of a firm with increased use of electronic gadgets by the employees to download and use official data...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 8 Solutions

Pkg Acc Infor Systems MS VISIO CD
Show all chapter solutions
add
Ch. 8 - What is the systems development life cycle (SDLC)?Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - a. What kinds of damage are included in the...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (pp....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Listed here are 20 control plans discussed in the...Ch. 8 - The following is a list of 12 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions add
YIELD TO CALL It is now January 1, 2014, and you are considering the purchase of an outstanding bond that was i...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

What is the primary reason for appropriating retained earnings?

College Accounting, Chapters 1-27 (New in Accounting from Heintz and Parry)

What is the database model?

Accounting Information Systems

Why is productivity important?

Essentials of Economics (MindTap Course List)

Define the term product

MKTG 12:STUDENT ED.-TEXT

Once you have a job, what steps can you take to be successful?

Foundations of Business (MindTap Course List)

Should an economic model describe reality exactly?

Principles of Microeconomics (MindTap Course List)