FINAL_STUDY GUIDE_(1-11)Update(12162008)

FINAL_STUDY GUIDE_(1-11)Update(12162008) - MANAFACTURER...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
MANAFACTURER CUSTOMER RETAILER DISTRIBUTOR SUPPLIER CUSTOMER MANAFACTURER DISTRIBUTOR RETAILER SUPPLIER M.W. 1. Demonstrate how the Internet and Internet technology work and how they support communication and E-business. Pg. 277 - Internet is the world’s largest implementation of linking/ client server computing and internetworking, linking hundreds of thousands of individual’s networks all over the world and more than 1 billion people worldwide. Individuals connect to the internet in two ways. Most home connect through internet service provider. An ISP is a commercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers. Ex: telephone lines, cable lines, wireless connections. Individuals can also connect though there business firms, university, or research centers. - Chat, Instant messaging, and Usenet (bulletin boards) - Public communication system - The world’s largest implementation of client/server computing and internetworking ( word internet drives from) - Linking more than 1 billion people world wide - Most home connect to the internet by subscribing to ISP - Individuals also connect internet through their business firms, universities, or research centers that have designated internet domains, such as www.devry.edu 2. Why are computer systems so vulnerable? And what are the most common threats that against contemporary information systems? Pg. 317 - They are vulnerable to many more threats than when they existed in manual form. They are connected through different network even in different locations. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. - The most common threats are that they can stem from technical, organizational, and environmental factors compounded by poor management decision. Vulnerabilities exist at each layer and in the communications between layers. Users can cause harm by introducing errors, accessing the system without authorization, or unknowingly downloading viruses and spy wares. Hackers can access data flowing over networks, steal valuable data during transmission, or alter messages without authorization. Intruders can launch denial of service attacks or malicious software to disrupt the operation of web sites. Without strong safeguards, valuable data could be lost or destroyed or could fall into the wrong hands, revealing important trade secrets or information that violates personal privacy.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
- Store in electronic form makes more vulnerable than existed manual form. - Information systems in different locations are interconnected - Unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point - Vulnerable can stem from technical, organizational, and environmental factors compounded by poor management decisions - Hackers can through a variety of ruses, access data flowing over networks, steal valuable data during transmission, or alter messages without authorization
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/14/2010 for the course IS IS535 taught by Professor Howardfredericks during the Spring '09 term at Keller Graduate School of Management.

Page1 / 10

FINAL_STUDY GUIDE_(1-11)Update(12162008) - MANAFACTURER...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online