8-1 Why are information systems vulnerable to destruction, error, and abuse? -List and describe the most common threats against contemporary information systems.

8-1 Why are information systems vulnerable to destruction, error, and abuse?

-List and describe the most common threats against contemporary information systems.

· Accessibility of networks

· Hardware problems (breakdowns, configuration errors, damage from improper use/crime)

· Software problems (programming errors, installation errors, unauthorized changes)

· Use of networks outside of firm’s control

· Loss and theft of portable devices.

-Define malware and distinguish among a virus, a worm, and a Trojan horse.

-Define a hacker and explain how hackers create security problems and damage systems.

-Define computer crime. Provide two example of crime in which computers are targets and two examples in which computers are used as instruments of crime.

-Define identity theft and phishing and explain why identity theft is such as big problem today.

-Describe the security and systems reliability problems employees create.

-Explain how software defects affect system reliability and security.

8-4 what are the most important tools and technologies for safeguarding information resources?

-Names and describe three authentication methods.

-Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.

-Explain how encryption protects information.

-Describe the role of encryption and digital certificates in a public key infrastructure.

-Distinguish between disaster recovery planning and business continuity planning.

-Identify and describe the security problems cloud computing poses.

-Describe measures for improving software quality and reliability.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *