IMG_5632.JPG

IMG_5624.JPG

IMG_5623.JPG

IMG_5633.JPG

IMG_5636.JPG

IMG_5621.JPG

IMG_5631.JPG

IMG_5627.JPG

IMG_5635.JPG

IMG_5638.JPG

IMG_5630.JPG

IMG_5634.JPG

IMG_5620.JPG

IMG_5628.JPG

IMG_5619.JPG

IMG_5639.JPG

IMG_5625.JPG

IMG_5637.JPG

IMG_5617.JPG

IMG_5626.JPG

IMG_5622.JPG

IMG_5629.JPG

8-1 Why are information systems vulnerable to destruction, error, and abuse?

-List and describe the most common threats against contemporary information systems.

· Accessibility of networks

· Hardware problems (breakdowns, configuration errors, damage from improper use/crime)

· Software problems (programming errors, installation errors, unauthorized changes)

· Use of networks outside of firm’s control

· Loss and theft of portable devices.

-Define malware and distinguish among a virus, a worm, and a Trojan horse.

-Define a hacker and explain how hackers create security problems and damage systems.

-Define computer crime. Provide two example of crime in which computers are targets and two examples in which computers are used as instruments of crime.

-Define identity theft and phishing and explain why identity theft is such as big problem today.

-Describe the security and systems reliability problems employees create.

-Explain how software defects affect system reliability and security.

8-4 what are the most important tools and technologies for safeguarding information resources?

-Names and describe three authentication methods.

-Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.

-Explain how encryption protects information.

-Describe the role of encryption and digital certificates in a public key infrastructure.

-Distinguish between disaster recovery planning and business continuity planning.

-Identify and describe the security problems cloud computing poses.

-Describe measures for improving software quality and reliability.

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com