IMG_5632.JPG
IMG_5624.JPG
IMG_5623.JPG
IMG_5633.JPG
IMG_5636.JPG
IMG_5621.JPG
IMG_5631.JPG
IMG_5627.JPG
IMG_5635.JPG
IMG_5638.JPG
IMG_5630.JPG
IMG_5634.JPG
IMG_5620.JPG
IMG_5628.JPG
IMG_5619.JPG
IMG_5639.JPG
IMG_5625.JPG
IMG_5637.JPG
IMG_5617.JPG
IMG_5626.JPG
IMG_5622.JPG
IMG_5629.JPG
8-1 Why are information systems vulnerable to destruction, error, and abuse?
-List and describe the most common threats against contemporary information systems.
· Accessibility of networks
· Hardware problems (breakdowns, configuration errors, damage from improper use/crime)
· Software problems (programming errors, installation errors, unauthorized changes)
· Use of networks outside of firm’s control
· Loss and theft of portable devices.
-Define malware and distinguish among a virus, a worm, and a Trojan horse.
-Define a hacker and explain how hackers create security problems and damage systems.
-Define computer crime. Provide two example of crime in which computers are targets and two examples in which computers are used as instruments of crime.
-Define identity theft and phishing and explain why identity theft is such as big problem today.
-Describe the security and systems reliability problems employees create.
-Explain how software defects affect system reliability and security.
8-4 what are the most important tools and technologies for safeguarding information resources?
-Names and describe three authentication methods.
-Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
-Explain how encryption protects information.
-Describe the role of encryption and digital certificates in a public key infrastructure.
-Distinguish between disaster recovery planning and business continuity planning.
-Identify and describe the security problems cloud computing poses.
-Describe measures for improving software quality and reliability.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com