Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 12CTP
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network; it is not restricted to single location.
- The data flowing over networks could be accessed; valuable information could be filched while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Capabilities, best suited business and purchase details:
- The capability of Kaspersky is shown below:
- It has the abilities of scanning.
- It has quick scanning feature for viruses as well as other threats.
- It checks for well-known malware as well as software vulnerabilities.
- It warns the security status of PC to user.
- It uses real time data to scan PC for viruses and threats.
- The capability of Norton is shown below:
- It provides threat monitoring in addition to SONAR technologies for safeguard.
- It can recognize and eliminate virus, spyware as well as other attacks.
- It can recognize threats from
operating system along with web browser vulnerabilities. - The users can excess knowledge base as well as information regarding harmful files and applications.
- It locates utmost vulnerable system regions.
- It scans infected areas that efficiently allocate system resources to place with highest potential threat...
Explanation of Solution
The choice of product:
- The details of antivirus products are shown below:
Characteristics | Kaspersky Antivirus 2012 | Norton Antivirus 2012 |
Anti-root kit | No | Yes |
Anti-spyware | Yes | Yes |
Antivirus | Yes | Yes |
Boot time scan | No | Yes |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
you will be writing an essay to discuss the evolution of hacking.
Your Essay should highlight the evolution of hacking from individuals to corporations (and their predominate locations) to cyber warfare. Include at least 5 different locations and events (more is better) to tell the story of how hacking has changed over time from the 1940's to present. Use your specific events to illustrate both when and what happened in each of these locations/events that changed the face of hacking as well as the global nature of hacking.
The events should be presented in time order. Also include images or figures, and any additional visual aids to help tell your story.
Where did the hack originate, who was the target if known, how did this event affect hacking as we know it, what was significant about this event. Your 5 or more locations should include at least 2 (preferably 3 or more) international locations as well as at least one United States location.
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary.
You are working in organization X, and you are supposed to develop an issue-specific security policy
issue is MOBILE COMPUTING
To develop the different sections of your policy, you can refer to SANS Policy Templates
https://www.sans.org/information-security-policy/
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- 4. College Security Computer and online security is a growing concern for businesses of all sizes. Computer security issues range from viruses to automated Internet attacks to outright theft, the result of which is lost information and lost time. Security issues pop up in news articles daily, and most business owners understand the need to secure their businesses. Your college is no different from any other business when it comes to information security. Draft a document identifying the questions you should ask your college's CIO to ensure information security across your campus.arrow_forwardCyber crimes. Using what you have learned so far about IT, find an article or two as an aid. In a one page outline your thoughts on a strategy a company you lead may take to protect your data. You may be as broad or focused as you desire. Comment on each of your peers vantage points on Cyber security. I know the first article is long but it is interesting.arrow_forwardYou must analyze a controversial issue within your professional field and prepare a position paper.The target audience is your immediate supervisor who has asked you to research the issue and present a position for the organization. a. Define an issue (controversial issue or industry topic) that is relevant within the field you have chosen to pursue for your career. Potential topics focused upon your major are provided below; IT Security ( Risk Management): Outsourcing risk Whether to pay the ransom for Ransomware Multi-cloud security Provide research on the background of the issue, discussing the merits of each side of the issue. You must summarize information from a minimum of two authoritative sources, providing appropriate references for your sources of information. The sources may include newspapers, books, magazines, news portals, databases, online libraries, websites, blogs, etc. Your sources may also include interviews with appropriate individuals from the…arrow_forward
- What are your opinions on whether social media sites like Facebook should provide law enforcement access to its users' accounts in order to conduct investigations? What precisely is the point of asking such a question?arrow_forwardYou are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation. Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms. After coordinating with the university Office of Technology…arrow_forwardData Security is considered a senior Management concern and responsibility. It affects every company’s operation, reputation and ultimately impacts revenue, profits, and a competitive edge. Yet many companies do not implement defenses that could help to prevent and control data breaches. In June 2012 LinkedIn a business social network site was hacked, this data breach was discovered when IT security experts discovered millions of LinkedIn passwords on a Russian underground site. The reason this happened was that the company was using outdated encryption methods and within 2 days, most passwords were cracked. What steps can a business take to keep control of its data security? What security management processes and activities in each process should a business follow to ensure they have an Information Technology Risk management strategy in place?arrow_forward
- Local, state, and federal government agencies are establishing e-gov sites in order to improve the efficiency and effectiveness of their operations. After reading the information presented in this module and other sources, write a one-page paper that summarizes six advantages of using e-gov applications for running a city. What are some of the challenges? Yelp is a successful social networking site. After reading the information presented in this module and other sources, write a one-page paper that describes the business model used by Yelp. How does Yelp generate revenue? How can businesses benefit from this social networking site? Who are the top two competitors of Yelp? Twitter has become a very popular personal as well as business social networking site. After reading the information presented in this module and other sources, write a one-page paper that summarizes five ways that a business can use Twitter in order to increase its revenue. What does “trending” mean on Twitter? What…arrow_forwardResearch and write a paper on iPhone evidence which follows current APA research, writing, sourcing, and citing guidelines. Write one to two pages discussing how to extract forensic evidence from an iPhone. There is a vast amount of potentially valuable evidence that an iPhone may contain. Conduct research and find out where to look for this evidence. Discuss several types of information that can be located and how to find it. Included are applications popular with criminal gangs to avoid the use of cellular voice networks, specifically Skype and Viber. summarize the location of SQLite and PList files associated with specific applications that may have been used on the iPhone. iPhone Backup iCloud Safari Mail SQLite Databases Skype Skype Location Skype Encryption Skype Evidence Skype Forensics Tools Viber Viber Location Viber Evidence Facebook Photographs Location Services Based on this information and your research provide a comprehensive report on how one can approach iPhone…arrow_forwardIntellectual Property refers to creations of the mind, including inventions, designs, images etc. used in commerce. It strikes the balance between the interests of innovators and the general public and aims to foster an environment in which creativity and innovation should flourish. As Risk Analyst at your firm, provide a summative report on Disaster Recovery as a Service provision at INFRATEL for your firm’s proprietary content.arrow_forward
- Explore the ethical considerations related to IoT data collection and usage, with a focus on consumer privacy and consent.arrow_forwardIdentity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished. 1. List three steps an individual should take to avoid identity theft. 2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data. 3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?arrow_forwardUse an online search engine to locate a peer-reviewed journal article with at least 100 citations that examines the hazards of working inside vs outside of an organisation. Is there a change in either type or an explanation for the shift in the paper's subject matter? In your opinion, which of the two categories is more difficult to avoid and why?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,