Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

1. What are the goals of security measures for ISs? Explain. 2. All the data of your company is concentrated in two databases. All employees

1. What are the goals of security measures for ISs? Explain.

2. All the data of your company is concentrated in two databases. All employees use PCs or laptop computers, and all use a corporate network. You are to prioritize protection of the following elements of your company: PCs and laptops, the databases, the corporate network. Which is the element about which you should be most concerned, and why?

3. Data alteration and destruction are dreaded by many IS managers more than any other mishap. Why? Is the threat of website defacement as severe as data destruction or alteration? Why or why not?

4. Some companies still make a duplicate copy of disks or tapes and transport them to a remote site as a precaution against loss of data on the original storage media. What is the preferred method of keeping secured copies of data nowadays? Give at least two benefits and one possible drawback of the more recent approach.

5. Comment on the following statement: If your computer is connected to an external communication line, anyone with a similar link can potentially access your systems.

6. What is a honeytoken and how is it used by companies?

7. What is a honeypot and how is it used by businesses?

8. What is the difference between a virus and a worm? Which is potentially more dangerous and why?

9. Why is encryption that uses the public-key method so important in electronic commerce?

10. Assume that you are charged with developing an application to record basketball performance statistics. What limits would you include to ensure that the information entered is reasonable?

11. What is an audit trail? What audit trail information would you have for a shipping record?

12. This chapter gives an example of an atomic transaction. Give another example from any business area.

13. What is the difference between authentication and confidentiality?

14. What are biometric access controls? How are they better than passwords?

15. What is a firewall, and how does it work?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microeconomics An Intuitive Approach with Calculus

Authors: Thomas Nechyba

1st edition

538453257, 978-0538453257

Students also viewed these General Management questions