100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MIS 2201 Exam Questions| Already Answered| GRADED A+ $7.99   Add to cart

Exam (elaborations)

MIS 2201 Exam Questions| Already Answered| GRADED A+

 0 view  0 purchase
  • Course
  • MIS 2201
  • Institution
  • MIS 2201

Describe the goal of information systems security - ANSWER-1. Threat - person or organization seeks to obtain data or other assets illegally, without owner's permission and often without owner's knowledge 2. Vulnerability - opportunity for threats to gain access to individual or organizational as...

[Show more]

Preview 2 out of 12  pages

  • September 2, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MIS 2201
  • MIS 2201
avatar-seller
vincentvince9822
MIS 2201 Exam Questions| Already
Answered| GRADED A+
Describe the goal of information systems security - ANSWER-1. Threat - person or organization seeks to
obtain data or other assets illegally, without owner's permission and often without owner's knowledge

2. Vulnerability - opportunity for threats to gain access to individual or organizational assets; for
example, when you buy online, you provide your credit card data, and as data is transmitted over
Internet, it is vulnerable to threats

3. Safeguard - measure individuals or organizations take to block threat from obtaining an asset; not
always effective, some threats achieve their goal in spite of safeguards

4. Target - asset desired by threat

5. Risk - The probability of a threat exploiting a vulnerability and the resulting cost.

6. Exploit- Tools or techniques that take advantage of a vulnerability.



Explain the prevalence of the computer security problem - ANSWER--No one knows the exact cost of
computer crimes

-Data loss single most expensive consequence of computer crime

-80% of respondents believe data on mobile devices poses significant risks



Sources of threats to digital security - ANSWER-Unauthorized data disclosure

-Human error: procedural mistakes

-Computer crime: pretexting, phishing, spoofing, sniffing, hacking



Incorrect data modification

-Human error: procedural mistakes, incorrect procedures, ineffective accounting

-Computer crime: hacking



Social Engineering - ANSWER-hackers use their social skills to trick people into revealing access
credentials or other valuable information

, Phishing - ANSWER-the fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information, such as passwords and credit
card numbers.



Spoofing - ANSWER-a situation in which a person or program successfully identifies as another by
falsifying data, to gain an illegitimate advantage



Sniffing - ANSWER-technique for intercepting computer communications



Hacking - ANSWER-unauthorized access, modification, or use of an electronic device or some element of
a computer system



Describe why DOS or DDOS attacks are difficult to defend against - ANSWER--sites don't know where the
attacks are coming from

-firewalls aren't designed to handle DDoS attacks

-the defense can't be mounted on the hosting provider's infrastructure



Explain how one should respond to security threats and practice safe computing - ANSWER-- Take
security seriously

- Create strong passwords

- Use multiple passwords

- Send no valuable data via email or IM

- Use https at trusted, reputable vendors

- Remove high-value assets from computers

- Clear browsing history



Describe how organizations should respond to security threats. - ANSWER-Senior management creates
company-wide policies:

- What sensitive data will be stores?

- How will data be processed?

- Will data be shared with other organizations?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller vincentvince9822. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart