Management Information Systems: Managing The Digital Firm (16th Edition)
Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 1RQ
Program Plan Intro

System vulnerability:

  • When huge amount of data is kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to a single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Malware:

  • A malware denotes a program that is harmful to a computer user.
  • It includes viruses, worms, Trojan horses and spyware programs that gather information without user permission.

Difference between a virus, a worm, and a Trojan horse:

VirusWormTrojan horse
A program that would replicate itself by being copied...

Explanation of Solution

Hacker:

  • A hacker denotes an individual who gains unauthorized access to computer system.
  • It does so by finding security protection weakness in websites and computer systems...

Explanation of Solution

Computer crime:

  • A computer crime denotes any violations of criminal law that involves knowledge of computer technology for perpetration, investigation or prosecution.
  • It is defined as commission of illegal acts through use of a computer or against computer system.

Examples of crime in which computers are targets:

The examples with computers as crime targets are shown below:

  • Confidentiality breach for protected computerized data.
  • Unauthorized access to computer systems.
  • Accessing protected computers for committing fraud.
  • Accessing protected computers for causing damage intentionally...

Explanation of Solution

Identity theft and phishing:

  • Identity theft denotes a crime in which personal information pieces are obtained.
  • It includes social security number, license number or credit card number to act as behalf of someone else.
  • The information might be used for obtaining credit, merchandise or services in name of victim.
  • It is a big problem today as internet has made easy for identity thieves to use stolen information.
  • The goods could be purchased online without any personal interaction...

Explanation of Solution

Security and system reliability problems created by the employees:

  • The employees create financial threats to business. It includes destruction of e-commerce sites, diversion of credit data and personal information.
  • Employees has access to privileged information and in presence of weak security procedures, they can check all personal details.
  • The system compromise happens when an employee lets coworker use the system...

Explanation of Solution

Software defects affecting system reliability and security:

  • The software could fail to perform well or gives erroneous result because of undetected bugs.
  • A control system may fail to carry messages or allow internet access.
  • The customers may be wrongly charged due to such failures.
  • The business may order more inventory than it requires...

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education