Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 10.9, Problem 10.3ARQ
Explanation of Solution
Security threats:
Security threat is a thing that can cause damage to the organization, IT systems and networks. For example, if the details of a bank account can be accessed by any intruder without the permission of an appropriate user for misusing their details is called as “threat”.
Explanation for elements that are given in “Figure 10-6”:
- If important data is involved in system then security measures have to be taken seriously to protect the data.
- Creating strong password for particular site and multiple passwords for different account is to keep hackers from accessing accounts more easily.
- Sending data via email or IM is not secure because hackers can easily hack those information using history logs.
- HTTPS is a hypertext transfer protocol for secure transformation or communication over the web.
- Removing high value of asset from computer is a way to keep our system safely.
- Hacker knows the information through browsing history, temporary files, and cookies of the system. So, clear all the visited files to prevent the system.
- Updating antivirus software is an essential thing to keep the system from threat.
- Security concern is an important for every worker so that everyone is on the same page when it comes to privacy.
- Following the guidelines of the company in order to reduce the chance of a threat.
- Business initiatives must consider this protection activity that would ensure the organization-wide.
IDS:
Intrusion detection system (IDS) is an application software or device which is used to monitor the networks or activities of the system for unauthorized access and threats to produce the caution reports to authorized user...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Define the term "authentication challenge-response system"
and provide some examples of its use. Just how does this
approach improve security over others, such as those that
need passwords?
When you say "goals," what do you have in mind for this authentication procedure? Just what are the pros and cons of various authentication strategies?
Here, a hypothetical identity management scenario is discussed. Make a list of every authentication method you have encountered. What do you believe about the future use of passwords as security measures?
Chapter 10 Solutions
Using MIS (10th Edition)
Ch. 10.4 - Prob. 1NFBQCh. 10.4 - Prob. 2NFBQCh. 10.4 - Prob. 3NFBQCh. 10.4 - Prob. 4NFBQCh. 10.4 - Prob. 5NFBQCh. 10.4 - Prob. 6NFBQCh. 10.5 - Prob. 1EGDQCh. 10.5 - Prob. 2EGDQCh. 10.5 - Prob. 3EGDQCh. 10.5 - Prob. 4EGDQ
Ch. 10.5 - Prob. 5EGDQCh. 10.5 - Prob. 6EGDQCh. 10.5 - Prob. 7EGDQCh. 10.9 - Prob. 1SGDQCh. 10.9 - Prob. 2SGDQCh. 10.9 - Prob. 3SGDQCh. 10.9 - Prob. 4SGDQCh. 10.9 - Prob. 10.1ARQCh. 10.9 - Prob. 10.2ARQCh. 10.9 - Prob. 10.3ARQCh. 10.9 - Prob. 10.4ARQCh. 10.9 - Prob. 10.5ARQCh. 10.9 - Prob. 10.6ARQCh. 10.9 - Prob. 10.7ARQCh. 10.9 - Prob. 10.8ARQCh. 10.9 - Prob. 10.9ARQCh. 10 - Prob. 10.1UYKCh. 10 - Prob. 10.2UYKCh. 10 - Prob. 10.3UYKCh. 10 - Prob. 10.4CE10Ch. 10 - Prob. 10.5CE10Ch. 10 - Prob. 10.6CE10Ch. 10 - Prob. 10.7CE10Ch. 10 - Prob. 10.8CS10Ch. 10 - Prob. 10.9CS10Ch. 10 - Prob. 10.1CS10Ch. 10 - Prob. 10.11CS10Ch. 10 - Prob. 10.12CS10Ch. 10 - Prob. 10.13CS10Ch. 10 - Prob. 10.14CS10Ch. 10 - Prob. 10.15MMLCh. 10 - Prob. 10.16MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Authentication is a process to verify an identity of someone. Authentication can be classified by something known, something possessed by physical characteristic or even a result from an involuntary action. For example, a password can be used as something known by the user to prove their identity. Give THREE (3) password selecting strategies that you can apply to your users in your system to help them in creating a good password.arrow_forwardThe concept of "multifactor authentication" has to be defined in detail. How safe is it in terms of stopping hackers from stealing users' passwords?arrow_forwardConsider a hypothetical scenario involving the administration of user logins. Create a comprehensive list of all conceivable authentication techniques. How do you feel about the future of passwords?arrow_forward
- If you could elaborate on the motivations for the authentication strategy, that would be fantastic. Consider the pros and cons of the various authentication methods by comparing and contrasting them.arrow_forwardFigure can be subjected to a non-repudiation attack. Analyze to see if a digital signature can be used to defend against this type of assault. Using a digital signature diagram, explain your answer.arrow_forwardDefine the term "authentication challenge-response system" and provide some examples of its use. As opposed to systems that require users to remember a series of passwords, how does this one improve security?arrow_forward
- Please define "authentication challenge-response system" and provide examples. How is this approach more secure than password-based ones?arrow_forwardWhat exactly do you mean when you say "objectives of authentication?" Analyze the pros and cons of each kind of identification and authentication.arrow_forwardOutline the procedure for a challenge-response authentication method. Intuitively, it is unclear how this approach improves upon the status quo of using passwords.arrow_forward
- Please define the concept of a challenge-and-response authentication system in your own words (CRAS). If passwords are so insecure, what makes this method of authentication so much better?arrow_forwardConcoct a made-up situation involving login management and detail the actions that would be carried out if it occurred. Make a decision from a few different authentication techniques. Is there any longer a time when logging in using a username and password makes sense?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education