This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 5. Illustrate why software defects can create security vulnerabilities 6. Present three impacts as the result of security shortage. Provide examples 7. Illustrate why input, processing and output in applications need to be controlled. Provide examples 8. What is the main purpose of having MIS audit? Provide three examples of what need to be audited 9. Access control involves authorization and authentication. Illustrate why a system needs to control these two issues 10. What can be used to protect data transmitted on the Internet, for example email, password information, etc....
View Full Document
- Spring '11