Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 12.7, Problem 4SGDQ

Explanation of Solution

Mention whether the situation that a person across the hallway in dorm can copy file using shared network is possible at a workplace:

Yes”, the situation that another employee can copy one’s files using shared folders is possible at workplace.

  • If the employer has strong network security this scenario to copy other’s file using shared network is difficult but not impossible...

Blurred answer
Students have asked these similar questions
How would you tell if you were a hacktivist or a cyber-terrorist? Isn't it a war crime to use hackers to target an enemy organization? What is the best time and way to utilize it? Another possibility is cyberterrorists.
Cyber security case: Who were the victims of the attacks?  What technologies and tools were used in the attack?   When did the attack happen within the network?  What systems were targeted?   What was the motivation of the attackers in this case? What did they hope to achieve?  What was the outcome of the attack? (stolen data, ransom, system damage, etc.)
Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key. Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's.  Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on the company systems. Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter's illusion of privacy. Is such a "little white lie" an ethical action on Charlie's part?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,