Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 7, Problem 6MBD
Explanation of Solution
Importance of securing data:
It is important to secure data because:
- Securing data prevents the compromise or loss of data contained in the
database , an event which could have serious ramifications for any company. - Securing data block attacks from unauthorized users or hackers which prevents the loss of sensitive information.
- Securing data prevents malware infections and stop viruses stealing data.
- Securing data ensures that physical damage to the server doesn’t result in the loss of data.
- Securing data prevents data loss through corruption of files or
programming errors.
Customer data hacking:
Following are the things that can happen when someone accesses the customer database:
- They can spend all the money: If someone manages to steal financial information from the user, then they can drain the bank accounts, drain your credit and debit cards, and quickly deposit all of the money into their accounts in no time at all.
- They can put the safety of the user and user’s family at risk: If someone was able to access addresses, phone numbers, drivers license numbers, passport numbers and PO Box addresses then they can put the physical safety of user and user’s family at risk.
- They can kill credit rating: When someone has user’s bank account and credit card details, the damage they can do to the users financial state is incredible.
Changing information in customer data:
When someone changes information in customer data are:
- Personally identifiable information is defined as data that can be used to identify, locate, or contact a specific individual and when hacker changes information then attackers can often go for malicious attacks that impact the victim directly, by applying for loans or credit cards under the user’s name, filing fraudulent income tax returns, and applying for loans under the victim’s name.
- Financial information such as banking information, billing accounts, insurance information and other data that can be used to access accounts or process financial transactions which when manipulated could greatly impact a user’s finances...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
More Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.
Have you ever seen someone being harassed or tormented by another person on the internet? What was your first response when you learned about the situation? How did you get to the conclusion that the individual had been the victim of bullying conduct prior to your intervention?
Computer Security is one of the fastest-moving fields in the world today. There are generally several incidents each week, including data breaches, large scale attacks, or some advancement in security research (i.e. new tools, techniques, vulnerabilities, or exploits). Select a recent event from your favorite security news source and summarize it. Include your source and an analysis of the event, including a summary of what happened, any new information from the event that changes current security practice, and any larger scale implications from the event. Relate the event to the topics in Chapter 1 of the book, namely the CIA triad, U.S. Compliance Laws (if any), IT domains, security policy, and/or data classification. In addition, relate the event to a biblical example.
Chapter 7 Solutions
Business Driven Technology
Knowledge Booster
Similar questions
- Does the word "privacy" have an agreed-upon meaning in common usage? Here are five things you can take to keep your personal data protected.arrow_forwardDo you believe it is reasonable to exchange your registration information and email address for free or nearly free software? Is there a way to assure that they are accountable for the data they collect and how they use it? Always be willing to defend your stance. Your claim must be backed up by evidence.arrow_forwardScenario; Janet spent most of her time using the internet to watch online movies, listen to music and most of all she is always connected to communicate with her parents who are OFW. She misses her parents that they communicate most of the time when both Janet and her parents are available for work and school. But one day Janet felt anxious that with her frequent communication with her parents somebody will invade their privacy and be able to access vital information like SSS number, bank account number, and family whereabouts. If you are the developer of the video call platform how will you ensure the safety of those people who are using the platform? What is your opinion regarding the use of information by an online platform? What other problems can you identify aside from security while doing an online platform?arrow_forward
- Is it really possible to talk about "hacking"? Is there anything you can do to prevent yourself from being a victim of a hacking attempt?arrow_forwardSeveral credit card firms now give users one-time-use credit card numbers as an extra layer of security for online purchases. There is just one purpose for these numerals. Customers may get the one-time-use number by visiting the website of the organization that issued their credit card. What are the advantages of employing this technology as opposed to more traditional methods of utilising credit card numbers? What are the advantages and disadvantages of employing this approach as opposed to using an electronic payment gateway for your own authentication?arrow_forwardWhat do you mean by a Computer worm?arrow_forward
- On the Internet, anyone can publish anything to a website, a blog, or a social media site, regardless of whether the information is true. Recent years have seen a spike in misleading or false “news” and hoaxes that are shared as fact on social media. How can you tell fake news stories from real ones?arrow_forwardWhat exactly does the term "privacy" imply? Is there a way to keep your personal data safe?arrow_forwardAs the name implies, IDS is a kind of program that can detect intrusions.arrow_forward
- This week, we learned about oversharing and how it can help an attacker gain access to important user credentials. As you’ll see throughout the semester, sharing certain information online can potentially lead to a lot of problems later. NOVA Labs put together an interesting story.A Cyber Privacy Parable (3:27)Links to an external site.Minimize VideoWatch the video and read the prompt above, and then respond to the following questions: Why do you feel that people should (or should not) be concerned about oversharing? What types of information do you share on your social media accounts? Let’s say that you saw a friend post the following message to her Twitter account: As someone familiar with cybersecurity, do you see anything wrong with this post? After seeing this posted online, what would you say (if anything) to your friend? Please make sure that all of your answers are numbered and in full sentences!arrow_forwardWhy are "cookies" not seen as a violation of privacy? Why are people hesitant to reveal personal information about themselves?arrow_forwardWhat are the legal and ethical considerations surrounding encryption, especially in cases where law enforcement seeks access to encrypted data?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,