Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem 7DQ
Program Plan Intro

System vulnerability:

  • When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
  • The information systems in many locations are been interconnected through communication networks.
  • The unauthorized access can occur at many access points in network and is not limited to single location.
  • The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
  • The denial-of-service attacks are launched by intruders to disrupt website operations.
  • Internets are vulnerable than internal networks as it is open to everyone.

Explanation of Solution

Minimize threats:

  • The fraud scoring must be used to prevent frauds in websites.
  • It denotes a fraud detection system that is used to identify high risk transactions.
  • The regular IT security audits should be performed to ensure security of system...

Blurred answer
Students have asked these similar questions
In the headlines of your piece, describe a recent security breach involving access control or authentication that had occurred. If that is the case, how did it influence the day-to-day operations? How much damage has been done to the company?
Security is not simply a technology issue, it’s a business issues, Discuss. Suppose your organization had an e-commerce Web site where it sold goods and accepted credit cards payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats?
Discuss how security is more than a technical issue; it's also a commercial concern.Assume your company has an e-commerce website that sells products and accepts credit card payments.Discuss the site's significant security threats and their potential consequences.What can be done to lessen these dangers?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
  • Text book image
    MIS
    Computer Science
    ISBN:9781337681919
    Author:BIDGOLI
    Publisher:Cengage
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage