Question
1. What are the goals of security measures for ISs? Explain. 2. All the data of your company is concentrated in two databases. All employees
1. What are the goals of security measures for ISs? Explain.
2. All the data of your company is concentrated in two databases. All employees use PCs or laptop computers, and all use a corporate network. You are to prioritize protection of the following elements of your company: PCs and laptops, the databases, the corporate network. Which is the element about which you should be most concerned, and why?
3. Data alteration and destruction are dreaded by many IS managers more than any other mishap. Why? Is the threat of website defacement as severe as data destruction or alteration? Why or why not?
4. Some companies still make a duplicate copy of disks or tapes and transport them to a remote site as a precaution against loss of data on the original storage media. What is the preferred method of keeping secured copies of data nowadays? Give at least two benefits and one possible drawback of the more recent approach.
5. Comment on the following statement: If your computer is connected to an external communication line, anyone with a similar link can potentially access your systems.
6. What is a honeytoken and how is it used by companies?
7. What is a honeypot and how is it used by businesses?
8. What is the difference between a virus and a worm? Which is potentially more dangerous and why?
9. Why is encryption that uses the public-key method so important in electronic commerce?
10. Assume that you are charged with developing an application to record basketball performance statistics. What limits would you include to ensure that the information entered is reasonable?
11. What is an audit trail? What audit trail information would you have for a shipping record?
12. This chapter gives an example of an atomic transaction. Give another example from any business area.
13. What is the difference between authentication and confidentiality?
14. What are biometric access controls? How are they better than passwords?
15. What is a firewall, and how does it work?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started