Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 11CTP
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Comparison of firms:

  • The details of two firms that offer security outsourcing services are shown below:
    • Company A:
      • The company A is one of leading firm in security outsourcing services.
      • The services offered by company includes:
        • Customized services
        • More expertise in solving security problems.
        • Different methods are introduced and more security copy rights.
        • It provides more security solutions.
        • It has professionals with experience in security as well as technological issues...

Explanation of Solution

The choice of outsourcing:

  • The company should outsource the computer security based on investment returns.
  • It is better option to choose company B than company A.
  • Company B provides quick and timely services, so that it helps company to react proactively.
  • It provides more flexibility in services, even though company A provides customization, flexibility is more important...

Blurred answer
Students have asked these similar questions
The organization you work for in Abu Dhabi is a startup company with 2 years in business. To comply with regulations, your CISO has decided to propose implementation of Information Security Management System (ISMS). As a member of the security team, you have to analyze the business needs for ISMS. Demonstrate effective contributions to the ISMS project team relevant to an assigned task as below: Introduce the Organization Demonstrate your project team Highlight the roles and responsibilities of each team member on the project Develop the ISMS for the organization by utilizing all the steps of from the ISO Standard 27001.
recommend an appropriate encryption algorithm cipher to deploy a business's needs.   Consider security protection best practices to defend against various types of security attacks. Consider and identify all of the risks in your recommendation. Consider the most current government regulations and how they will be met. How will this algorithm cipher be used? What is the best cipher and why? What are the reasons why you might not choose the most secure cipher?
As a security officer, you have been requested to assist the company’s recruitment officer with the drafting of a newemployee recruitment security protocol that the organization intends to adopt for all recruitment purposes in the future. Provide a brief but comprehensive document which must cover the most important security area the organization needs to focus on when recruiting new employees.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education