{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ex5 - 5 Illustrate why software defects can create security...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Management Information Systems Course: BA160IU HCMC International University Date Start: 2011-11-08 Dr. Tran Manh Ha Date End: 2011-11-14 Exercise #5 Problem 5.1: Securing information systems (0 points) You use knowledge learned and supporting materials from lecture eight to address the following questions. No submission is required. 1. Illustrate why access to the Internet becomes vulnerable 2. Distinguish various malicious software such as viruses, spyware and Trojan horses 3. Distinguish various hacking forms such as sniffer, spoofing and denial of service 4. Provide security threats along with examples inside an organization
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 5. Illustrate why software defects can create security vulnerabilities 6. Present three impacts as the result of security shortage. Provide examples 7. Illustrate why input, processing and output in applications need to be controlled. Provide examples 8. What is the main purpose of having MIS audit? Provide three examples of what need to be audited 9. Access control involves authorization and authentication. Illustrate why a system needs to control these two issues 10. What can be used to protect data transmitted on the Internet, for example email, password information, etc....
View Full Document

{[ snackBarMessage ]}