8-1 Why are information systems vulnerable to destruction, error, and abuse?
-List and describe the most common threats against contemporary information systems.
· Accessibility of networks
· Hardware problems (breakdowns, configuration errors, damage from improper use/crime)
· Software problems (programming errors, installation errors, unauthorized changes)
· Use of networks outside of firm’s control
· Loss and theft of portable devices.
-Define malware and distinguish among a virus, a worm, and a Trojan horse.
-Define a hacker and explain how hackers create security problems and damage systems.
-Define computer crime. Provide two example of crime in which computers are targets and two examples in which computers are used as instruments of crime.
-Define identity theft and phishing and explain why identity theft is such as big problem today.
-Describe the security and systems reliability problems employees create.
-Explain how software defects affect system reliability and security.
8-4 what are the most important tools and technologies for safeguarding information resources?
-Names and describe three authentication methods.
-Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
-Explain how encryption protects information.
-Describe the role of encryption and digital certificates in a public key infrastructure.
-Distinguish between disaster recovery planning and business continuity planning.
-Identify and describe the security problems cloud computing poses.
-Describe measures for improving software quality and reliability.