Why are information systems vulnerable to destruction, error, and abuse? List and describe the most common
Question:
Why are information systems vulnerable to destruction, error, and abuse?
• List and describe the most common threats against contemporary information systems.
• Define malware and distinguish among a virus, a worm, and a Trojan horse.
• Explain the challenges presented in securing wireless networks.
• Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.
• Define identity theft and phishing and explain why identity theft is such a big problem today.
• Describe the security and system reliability problems employees create.
• Define denial of service (DoS) attack, explain how it differs from a distributed denial of service (DDoS) attack, and discuss how DoS and DDoS attacks are related to the use of botnets.
Step by Step Answer: