8-1 Why are information systems vulnerable to destruction, error, and abuse?
-List and describe the most common threats against contemporary information systems.
· Accessibility of networks
· Hardware problems (breakdowns, configuration errors, damage from improper use/crime)
· Software problems (programming errors, installation errors, unauthorized changes)
· Use of networks outside of firm’s control
· Loss and theft of portable devices.
-Define malware and distinguish among a virus, a worm, and a Trojan horse.
-Define a hacker and explain how hackers create security problems and damage systems.
-Define computer crime. Provide two example of crime in which computers are targets and two examples in which computers are used as instruments of crime.
-Define identity theft and phishing and explain why identity theft is such as big problem today.
-Describe the security and systems reliability problems employees create.
-Explain how software defects affect system reliability and security.
8-4 what are the most important tools and technologies for safeguarding information resources?
-Names and describe three authentication methods.
-Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
-Explain how encryption protects information.
-Describe the role of encryption and digital certificates in a public key infrastructure.
-Distinguish between disaster recovery planning and business continuity planning.
-Identify and describe the security problems cloud computing poses.
-Describe measures for improving software quality and reliability.
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Blog
Archive
Contact
google+twitterfacebook
Copyright © 2019 HomeworkMarket.com