Question: Why are information systems vulnerable to destruction, error, and abuse? a) List and describe the most common threats against contemporary information systems. b) Define malware

Why are information systems vulnerable to destruction, error, and abuse?

a) List and describe the most common threats against contemporary information systems.

b) Define malware and distinguish among a virus, a worm, and a Trojan horse.

c) Define a hacker and explain how hackers create security problems and damage systems.

d)  Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.

e) Define identity theft and phishing and explain why identity theft is such a big problem today.

f) Describe the security and system reliability problems employees create.

g) Explain how software defects affect system reliability and security.

Step by Step Solution

3.43 Rating (153 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a The most common threats against contemporary information systems include technical organizational and environmental factors compounded by poor management decisions Figure 81 includes the following T... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (2 attachments)

PDF file Icon

1435_6054778aaa97d_640046.pdf

180 KBs PDF File

Word file Icon

1435_6054778aaa97d_640046.docx

120 KBs Word File

Students Have Also Explored These Related Management Information Systems Questions!