Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8HMP
Program Plan Intro
System vulnerability:
- When huge data amounts are been kept in electronic form, it becomes susceptible to many threats.
- The
information systems in many locations are been interconnected through communication networks. - The unauthorized access can occur at many access points in network and is not limited to single location.
- The data flowing over networks could be accessed; valuable information could be stolen while transmission or data could be altered without authorization.
- The denial-of-service attacks are launched by intruders to disrupt website operations.
- Internets are vulnerable than internal networks as it is open to everyone.
Explanation of Solution
Impact on business:
- A risk assessment is to be performed to determine impact on business.
- The value of information assets, vulnerability ...
Explanation of Solution
Steps to prevent damage:
- The steps taken to prevent website damages includes:
-
o Access controls:
- It prevents improper access to system of organization.
- The unauthorized users would be restricted using this method.
-
o Firewalls:
- It prevents access of private networks from unauthorized users.
-
o Intrusion detection systems:
- The monitoring tools are placed at most vulnerable points, It detects and deters intruders for system.
-
o Antivirus program:
- The software program that checks systems and drives for presence of virus...
-
o Access controls:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Investigate the Sony PlayStation Network hack that occurred in April 2011.What type of attack was it?Was the success of the attack due to technology problems at Sony, management problems at Sony, or a combination of both? Provide specific examples to support your answer.Which Sony controls failed?Could the hack have been prevented? If so, how?Discuss Sony’s response to the hack.Describe the damages that Sony incurred from the hack.
LET'S ANALYZE TEXT AND VISUAL INFORMATION
DIRECTION: Study the visual information below and answer the following questions briefly. Write your
answer in your activity sheet.
X
HACKER
SCANNING
BRUTEFORCE
Source:
FIREWALL
CRACKING
TROJAN HORSE
https://www.alamy.com/stock-
photo-internet-security-flat-
icon-set-for-flyer-poster-web-
site-like-hacker-87255828.html
STATEMIRROR
PIST
SPAM
VIRUS
PROTECTION
1. What is/are the content/s of this visual media? Explain in 2-3 sentences only.
2. What do you think is the purpose/intention of this visual media? Explain in 2-3 sentences only.
How is this visual media disseminated to people? Explain in 2-3 sentences only.
VOICING OUT MY THOUGHTS
DIRECTION: In your own understanding/opinion, how can multimedia be of help in the following
industries? Explain your answer in 2-3 sentences each. (15pts)
2. Engineering and Infrastructure
3. Fashion Industry
STOP
U
Online University Malaya (OUM) is a renowned open distance learning academic
institution in Malaysia. OUM has branches all over the country. OUM would like to ensure
the availability of the services provided by them are accessible by OUM's staff and
students twenty-four hours a day, seven days a week. As the Senior Network Security
Consultant in OUM, your tasks are to:
Propose and discuss THREE key aspects (security controls) of approaching a good cyber
security
a. FIRST key aspect (security control) of approaching a good cyber security for the
company with appropriate example
b. SECOND key aspect (security control) of approaching a good cyber security for
the company with appropriate example
c. THIRD key aspect (security control) of approaching a good cyber security for the
company with appropriate example
(Number of Words: 500 – 700 Words)
Chapter 8 Solutions
Essentials of MIS (13th Edition)
Ch. 8.1 - Prob. 1CQ1Ch. 8.1 - Prob. 2CQ1Ch. 8.1 - Prob. 3CQ1Ch. 8.1 - Prob. 4CQ1Ch. 8.4 - Prob. 1CQ2Ch. 8.4 - Prob. 2CQ2Ch. 8.4 - Prob. 3CQ2Ch. 8.4 - Prob. 4CQ2Ch. 8 - Prob. 1IQCh. 8 - Prob. 2IQ
Ch. 8 - Prob. 3IQCh. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11CTPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
- Analyze the security challenges and vulnerabilities faced by the Internet, including DDoS attacks, phishing, and data breaches.arrow_forwardTo keep in touch with friends, family, and coworkers, people of all ages use social networking sites like Facebook and Twitter. The risks of revealing a large quantity of personal information on social networks are often underestimated by users. What role does social networking play in social engineering attacks?Personal and private information is increasingly at risk from cyberattacks.arrow_forwardSocial networks have become popular media among individuals of all ages to stay connected with friends, family, colleagues and coworkers. However, many users are unaware of the dangers of sharing vast amount of personal information on social networks. How can social networking be used to facilitate social engineering attacks? What can individuals and organizations do to secure personal and proprietary information from these attacks?arrow_forward
- Explore the challenges and solutions in achieving secure Software-Defined Networking (SDN), including the prevention of SDN-based attacks.arrow_forward1. What are the best security practices online when accepting electronic payments? 2. How can ecommerce website administrators stay up to date with electronic payment regulations and laws as they change? 3. What are some security measures that an ecommerce website administrator implement to ensure that an online payment site is being protected from hackers, phishing, and malware?arrow_forwardDefend the value of firewalls in preventing cyber attacks on your company. Why do people use firewalls, and what are the benefits and drawbacks of both hardware and software firewalls? How do you evaluate the safety of your company's network, and what tools do you use? How may one best avoid being blocked by web filters?arrow_forward
- It is a common practice to place Web servers in the DMZ (demilitarized zone) which can make them a target for hackers. What would you do to protect your Web servers? Name three vulnerabilities you would guard against.arrow_forwardAll hackers would want to get their hands on a web server. Talk about the numerous safety precautions that may be used to prevent the attacks.arrow_forwardDiscuss the development of web-based attacks from 2009-2015, you are to write a report and show the development of these attacks, The following sections should be included in the report:IntroductionWeb based attack developmentSolutionsExpected future trendarrow_forward
- Discuss the ways in which firewalls may help secure your company. What are the benefits and drawbacks of utilizing hardware and software firewalls? To evaluate the security of your company's computer infrastructure, what software tools do you use? What are the best ways to get around web filtering software?arrow_forwardDiscuss the challenges and solutions related to internet security, including topics such as DDoS attacks, encryption protocols, and cybersecurity best practices.arrow_forwardConsider the specific measures you would take to defend yourself against web application attacks.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you