Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 7, Problem 6MBD

Explanation of Solution

Importance of securing data:

It is important to secure data because:

  • Securing data prevents the compromise or loss of data contained in the database, an event which could have serious ramifications for any company.
  • Securing data block attacks from unauthorized users or hackers which prevents the loss of sensitive information.
  • Securing data prevents malware infections and stop viruses stealing data.
  • Securing data ensures that physical damage to the server doesn’t result in the loss of data.
  • Securing data prevents data loss through corruption of files or programming errors.

Customer data hacking:

Following are the things that can happen when someone accesses the customer database:

  • They can spend all the money: If someone manages to steal financial information from the user, then they can drain the bank accounts, drain your credit and debit cards, and quickly deposit all of the money into their accounts in no time at all.
  • They can put the safety of the user and user’s family at risk: If someone was able to access addresses, phone numbers, drivers license numbers, passport numbers and PO Box addresses then they can put the physical safety of user and user’s family at risk.
  • They can kill credit rating: When someone has user’s bank account and credit card details, the damage they can do to the users financial state is incredible.

Changing information in customer data:

When someone changes information in customer data are:

  • Personally identifiable information is defined as data that can be used to identify, locate, or contact a specific individual and when hacker changes information then attackers can often go for malicious attacks that impact the victim directly, by applying for loans or credit cards under the user’s name, filing fraudulent income tax returns, and applying for loans under the victim’s name.
  • Financial information such as banking information, billing accounts, insurance information and other data that can be used to access accounts or process financial transactions which when manipulated could greatly impact a user’s finances...

Blurred answer
Students have asked these similar questions
More Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.
Have you ever seen someone being harassed or tormented by another person on the internet? What was your first response when you learned about the situation? How did you get to the conclusion that the individual had been the victim of bullying conduct prior to your intervention?
Computer Security is one of the fastest-moving fields in the world today. There are generally several incidents each week, including data breaches, large scale attacks, or some advancement in security research (i.e. new tools, techniques, vulnerabilities, or exploits). Select a recent event from your favorite security news source and summarize it. Include your source and an analysis of the event, including a summary of what happened, any new information from the event that changes current security practice, and any larger scale implications from the event. Relate the event to the topics in Chapter 1 of the book, namely the CIA triad, U.S. Compliance Laws (if any), IT domains, security policy, and/or data classification. In addition, relate the event to a biblical example.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,