Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 7DQ
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Minimize threats:
- The fraud scoring must be used to prevent frauds in websites.
- It denotes a fraud detection system that is used to identify high risk transactions.
- The regular IT security audits should be performed to ensure security of system...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
In the headlines of your piece, describe a recent security breach involving access control or authentication that had occurred. If that is the case, how did it influence the day-to-day operations? How much damage has been done to the company?
Security is not simply a technology issue, it’s a business issues, Discuss. Suppose your organization had an e-commerce Web site where it sold goods and accepted credit cards payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats?
Discuss how security is more than a technical issue; it's also a commercial concern.Assume your company has an e-commerce website that sells products and accepts credit card payments.Discuss the site's significant security threats and their potential consequences.What can be done to lessen these dangers?
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- If Your Ecommerce Site is exposed to a cyber-attack, what will you do to restore it, and what are the effects of that on your customers. What are your plans to avoid such a situation in the future?arrow_forwardDo you have any suggestions for protecting the company's network from being attacked by cybercriminals?arrow_forwardThis article analyzes cyberbullying from its beginnings to its effects on society to its potential remedies?arrow_forward
- Do you have any suggestions for protecting the company's network against online threats?arrow_forwardEmail is vulnerable to several denial of service attacks. Use your experience to suggest the best attack defense.arrow_forwardProvide details on a recent security breach involving either access control or authentication in the news. Has it had a detrimental impact on the company's day-to-day business? Is there any particular harm that the company has experienced as a result of this?arrow_forward
- 1. What are the best security practices online when accepting electronic payments? 2. How can ecommerce website administrators stay up to date with electronic payment regulations and laws as they change? 3. What are some security measures that an ecommerce website administrator implement to ensure that an online payment site is being protected from hackers, phishing, and malware?arrow_forwardYou are required to prepare a plan of action to combat recent phishing to online banking due to the rise in cybercrime. In your plan of action, you should be incorporating the following points: (a) Elaborate what phishing is. (b) Discuss on how can phishing affect the online banking. Provide some real three examples. (c) Explain on how can the online banking customers avoid being affected by phishing with aid of three examples.arrow_forwardThis article takes a very in-depth look at the phenomenon of cyberbullying and discusses its history, the effects it has on society, and potential remedies.arrow_forward
- When you say "cybercrime," what do you mean exactly? Provide three types of prohibited online behaviour along with some examples of each.arrow_forwardDiscuss at least two different sorts of countermeasures that businesses use to mitigate social engineering attacks.arrow_forwardWhat are your views on cybercrime? In answer to this question, provide references.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you