Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 10.9, Problem 10.7ARQ
Program Plan Intro
Security threats:
Security threat is a thing that can cause damage to the organization, IT systems and networks.
- For example, if the details of abank account can accessed by any other intruder without the permission of an appropriate user for misusing purpose is called as “threat”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Discuss the security implicationsFrom the perspective of your department and management level, discuss the implications of a security breach in the company's infrastructure (all forms - human, technology etc.)
1. Suggest TWO reasons why such breaches could occur and state how they can be avoided.
Based on the above requirements above, critique the below discussion:
A security breach is the loss of management, compromising, illicit public disclosure, unapproved acquiring, or acquisition, or any similar event in which sensitive data is accessed or potentially obtained by someone other than an authorized user, or in which a verified user accesses privately apparent data with a purpose other than that for which it is approved.A cyberattack and data breach at Trading could have a negative effect on the company's bottom line. It might harm your company's reputation and cause customers to lose faith in you. And both large and small businesses may be impacted by this. Furthermore, a…
The following are some examples of how a security framework may help with security infrastructure design and deployment.
The definition and operation of information security governance are ambiguous.
Who in the firm should be in charge of long-term planning?
1)
fundamental to cybersecurity. However, there are often trade-offs between them and
prioritization of different components.
The components in the CIA Triad – Confidentiality, Integrity, and Availability – are
1. For each component in the CIA Triad, provide a scenario where you feel
that component should be prioritized over the other two.
а.
If you are having problems coming up with scenarios, consider things like emergency
systems; financial, legal, or personal information; military systems; health care; digital
currencies; etc.
b..
on wny it should be prioritized over the other 2 components.
For each of the scenarios in (a) provide 2-3 sentences with your reasoning
Chapter 10 Solutions
Using MIS (10th Edition)
Ch. 10.4 - Prob. 1NFBQCh. 10.4 - Prob. 2NFBQCh. 10.4 - Prob. 3NFBQCh. 10.4 - Prob. 4NFBQCh. 10.4 - Prob. 5NFBQCh. 10.4 - Prob. 6NFBQCh. 10.5 - Prob. 1EGDQCh. 10.5 - Prob. 2EGDQCh. 10.5 - Prob. 3EGDQCh. 10.5 - Prob. 4EGDQ
Ch. 10.5 - Prob. 5EGDQCh. 10.5 - Prob. 6EGDQCh. 10.5 - Prob. 7EGDQCh. 10.9 - Prob. 1SGDQCh. 10.9 - Prob. 2SGDQCh. 10.9 - Prob. 3SGDQCh. 10.9 - Prob. 4SGDQCh. 10.9 - Prob. 10.1ARQCh. 10.9 - Prob. 10.2ARQCh. 10.9 - Prob. 10.3ARQCh. 10.9 - Prob. 10.4ARQCh. 10.9 - Prob. 10.5ARQCh. 10.9 - Prob. 10.6ARQCh. 10.9 - Prob. 10.7ARQCh. 10.9 - Prob. 10.8ARQCh. 10.9 - Prob. 10.9ARQCh. 10 - Prob. 10.1UYKCh. 10 - Prob. 10.2UYKCh. 10 - Prob. 10.3UYKCh. 10 - Prob. 10.4CE10Ch. 10 - Prob. 10.5CE10Ch. 10 - Prob. 10.6CE10Ch. 10 - Prob. 10.7CE10Ch. 10 - Prob. 10.8CS10Ch. 10 - Prob. 10.9CS10Ch. 10 - Prob. 10.1CS10Ch. 10 - Prob. 10.11CS10Ch. 10 - Prob. 10.12CS10Ch. 10 - Prob. 10.13CS10Ch. 10 - Prob. 10.14CS10Ch. 10 - Prob. 10.15MMLCh. 10 - Prob. 10.16MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Discuss the security implications From the perspective of your department and management level, discuss the implications of a security breach in the company's infrastructure (all forms - human, technology etc.) 1. Suggest TWO reasons why such breaches could occur and state how they can be avoided. Based on the above requirements above, critique the below discussion: As a student of Management Information System recently employed as a management intern, I was given the responsibility of analyzing reliable data on currency transactions from June 2016 to November 2017, covering more than two thousand digital currencies.MGMT eCash Inc. wants to identify pertinent items, forecast market trends, and determine a plan of action with the help of this investigation. The company, which prioritizes direct communication, wants to become a client-focused online help provider by looking into the problems caused by cybercrimes, security lapses, and volatile markets. This will help it become a…arrow_forwardThe majority of individuals concur that creating proper security rules and consistently implementing them are necessary actions to take. An explanation of why creating, implementing, and maintaining security rules is so important.arrow_forward1.List any two functions of the Computer Security Incident Response Team (CSIRT). 2.Training for which level of users includes development of risk management goals, means of measurement, and the need to lead by example in the area of security awareness? General Users Management-Level Executive - Level Programmer/Developer Level 3.What is the main goal of security awareness training? To teach employees how to hack into company systems To train employees to be security experts To educate employees about the importance of security To increase employee productivityarrow_forward
- Question Design a case study involving a hypothetical cybersecurity scenario by using this outline 1. The various types of stakeholders potentially affected by the case, and the differentstakes/interests they have in the outcome.2. The different types of cybersecurity professionals or practitioners that might be involved in a case like this, and their specific responsibilities.3. The potential benefits and risks of harm that could be created by effective or ineffective cybersecurity practices in the case, including ‘downstream’ impacts. 4. The ethical challenges most relevant to this case 5. The ethical obligations to the public that such a case might entail for the cybersecurity professionals involved.6. Any potential in the case for disparate impacts on others, and how those impacts might affect the lives of different stakeholders7. The ethical best-case scenario (the best outcome for others that the cybersecurity practitioners involved could hope to secure from their practice)…arrow_forwardSelect the WRONG statement about OPSEC methodology Every security measure should be proportional to the value of what we want to protect We should first identify assets and the threats against them before implementing security measures Security measure can be implemented after identifying assets and threats against them We should apply the same level of security to every assetarrow_forwardBreak down and identify the six major functional areas of the Security Audit function which are universally accepted and discuss in DETAIL each functional area in detail providing real life system examples where necessary.arrow_forward
- explain why each principle is vital to security and how it facilitates the creation of security mechanisms that may be used to achieve desired security policies in companies.arrow_forwardCountermeasures come in a variety of sizes, shapes, and levels of complexity. This document endeavors to describe a range of strategies that are potentially applicable to life in education organizations. In an effort to maintain this focus, those countermeasures that are unlikely to be applied in education organizations are not included here. If after your risk assessment, for example, your security team determines that your organization requires high-end countermeasures like retinal scanners or voice analyzers, you will need to refer to other security references and perhaps hire a reliable technical consultant.arrow_forwardDefine each idea and explain how it contributes to the establishment of security mechanisms that may be utilised to accomplish desired security policies in firms. Specifically, focus on how the mechanisms can be used to protect sensitive information.arrow_forward
- Explain why each principle is vital to security and how it permits the development of security mechanisms that can help organizations achieve desired security policies.arrow_forwardThe majority of individuals agree that creating proper security rules and consistently implementing them are necessary actions to take. Describe the importance of creating, implementing, and maintaining security policies.arrow_forwardwriting organization policy. Name of the policy (Security Awareness and Training Policy) 2. Policy Definition: 3. Purpose 4. Scope 5. Target Audience or Applicability 6. Objectives: Information security is deemed to safeguard three main objectives: • Confidentiality - data and information assets must be confined to people authorized to access and not be disclosed to others; • Integrity - keeping the data intact, complete and accurate, and IT systems operational; • Availability - an objective indicating that information or system is at disposal of authorized users when needed. 7. Standard 8. Roles and Responsibilities 9. Procedures and Guidelines 10 Compliance and Enforcement 11. Non-Compliance and Exceptions 12. Referencesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning