Why Are Information Systems Vulnerable to Destruction, Error, and Abuse? – Exam – ronjonbon
Search
Essays
Sign up
Sign in
Contact us
Tweet
Index
/Business
Why Are Information Systems Vulnerable to Destruction, Error, and Abuse?
8.1 Why are information systems vulnerable to destruction, error, and abuse?
List and describe the most common threats against contemporary information.
Information systems are vulnerable to destruction, error and abuse because they are susceptible to unauthorized users who can gain access to company networks. Common threats against contemporary information can occur in communication lines, with clients, communication lines, corporate servers and corporate systems.

Threats to users/ client access which can involve errors and unauthorized access.
Threats can also occur with communication. This can stem from communication lines such as wire-tapping, and sniffing, message modifications, fraud/ theft, and radiation.

Threats can also occur on corporate servers. This occurs with hacked servers, planted viruses and worms, theft and fraud, and denial- of-service attacks.

Threats also occur on corporate systems. This includes, stolen, copied and manipulated company data. As well as crashes in hardware and software.
Define malware and distinguish among a virus, a worm, and a Trojan
Malware is a malicious software, which is any program or file that can be harmful to a computer user. Malwares can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users’ computer activity without their permission. Malwares can include a computer virus, worm, a trojan and spyware. A virus is the most common malware. It is a malicious program that can spread by piggy backing off of files and programs that are already on the computer. A worm, is a malware that can self-replicate without a host program. Worms can also spread without directives from malware authors. A trojan, is a program that is designed to appear as a legitimate program but can only perform its functions until after it is downloaded.

Define a hacker and explain how hackers create security problem and damage systems.
A hacker is an individual who gains unauthorized access to a computer system by finding flaws within a security protection used by websites and computer systems. Hackers create security problems and damage systems by stealing goods and information. They also can damage systems and commit cyber vandalism by disrupting, defacing and destroying company website or corporate information system.

Define identify theft and phishing and explain why identity theft is such a big problem today.
Identity theft is when someone gains information about an individual and uses the information to act as if they were that person. This involves the use of the person’s social security number, credit card information, driver’s license or other pieces of personal information. Phishing, is a technique that is used to perform identity theft. The technique involves creating a fake website or sending e-mails that resemble a business in order to ask for confidential and personal information from the victim. Identity theft is such a big problem today because the stolen information can be used to acquire merchandise and services worldwide.

8.2 What is the business value of security and control?
Explain how security and control provide value for businesses.
The business value of control refers to the measurements that a company takes in order to prevent intrusions from hackers or unauthorized individuals. The business value of control pertains to the measurements that a company takes in order to keep their assets safe. Security and control can provide value for business because measurements taken in security can create policies and procedures that will aim to eliminate threats of identity theft or damage to a company’s system. Measurements in the business value of control can be used to create policies and procedures that check the accuracy and reliability of the company’s information and data.

Describe the relationship between security and control
Continue for 5 more pages »
Read full document
Download as (for upgraded members)
Citation Generator
MLA 7
CHICAGO
(2018, 05). Why Are Information Systems Vulnerable to Destruction, Error, and Abuse?. EssaysForStudent.com. Retrieved 05, 2018, from
“Why Are Information Systems Vulnerable to Destruction, Error, and Abuse?” EssaysForStudent.com. 05 2018. 2018. 05 2018 < "Why Are Information Systems Vulnerable to Destruction, Error, and Abuse?." EssaysForStudent.com. EssaysForStudent.com, 05 2018. Web. 05 2018. < "Why Are Information Systems Vulnerable to Destruction, Error, and Abuse?." EssaysForStudent.com. 05, 2018. Accessed 05, 2018. Essay Preview By: ronjonbon Submitted: May 10, 2018 Essay Length: 1,329 Words / 6 Pages Paper type: Exam Views: 694 Report this essay Tweet Related Essays Bank Accounting Information System and Electronic Banking Introduction Information technology has had as much impact on our society as the industrial revolution. In the information age, companies are finding that success or 4,453 Words  |  18 Pages Cis 319: Computers and Information Systems - Databases in My Organization Databases in My Organization CIS319: Computers and Information Systems Abstract Databases have been in use since the early days of computing programs. An Information Technology 973 Words  |  4 Pages The Defense Information Systems Agency Organization The Defense Information Systems Agency is a combat support agency that is responsible for planning, engineering, acquiring, fielding, and supporting global net centric solutions 504 Words  |  3 Pages How the Information Age Has Changed the Information Systems Industry The Information Age has changed the Information Systems industry by creating software that makes most tasks that would normally require expert knowledge user friendly, allowing 337 Words  |  2 Pages Similar Topics Nike Information System Case Studies Impact Information Systems On Business Get Access to 89,000+ Essays and Term Papers Join 209,000+ Other Students High Quality Essays and Documents Sign up © 2008–2020 EssaysForStudent.comFree Essays, Book Reports, Term Papers and Research Papers Essays Sign up Sign in Contact us Site Map Privacy Policy Terms of Service Facebook Twitter

Get Your Essay

Cite this page

Are Information Systems And Security Problem. (June 30, 2021). Retrieved from https://www.freeessays.education/are-information-systems-and-security-problem-essay/