Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10.5, Problem 7EGDQ

Explanation of Solution

General principles of computer usage:

The following are the general principles used to protect data from an unauthorized access.

Do not transmit valuable data unless it is encrypted:

Do not transmit the valuable data while using public wireless networks. If the data is not in the encrypted form, it can be easily accessible by anyone.

Do not visit or access unknown websites when using public wireless network:

The unsecured websites has the malicious activities that can affect user’s computer by using public wireless network.

Encrypt all the valuable data before storing it:

Encryption is the process to secure the data using a key...

Blurred answer
Students have asked these similar questions
Identify the databases that store personal information about you. What is the frequency with which each database provides you with a tangible copy of your data? What concerns do you have regarding data security?
What are the guidelines for collecting and accessing personal data?
List the databases that hold your data. How is each database's data saved, and how often may you print out the contents of your data record? Your biggest worry is data privacy?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning