2 audit trails these enable attempts at unauthorized

This preview shows page 296 - 299 out of 371 pages.

2. Audit Trails These enable attempts at unauthorized access to be logged. 3. Data Encryption S YSTEMS T HEORY & M ANAGEMENT I NFORMATION S YSTEMS 28 3
Image of page 296

Subscribe to view the full document.

Answers - Mocks Most operating systems provide a facility for data encryption to protect data that is stored on a computer or data in transit. With data encryption, the data is coded using a key and it can only be decoded by a user possessing the decoding key. 4. File Access Permissions Operating systems could restrict the operations performed on a file (e.g. read, write, modify) or the type of users who can access a file (e.g. normal user, administrator or power user) based on preferences supplied by the systems administrator. 5. FILE RECOVERY UTILITIES e.g. Recycle Bin in Windows range of operating systems. These enable accidentally deleted files to be recovered since all deleted files are directed to a temporary storage location before they are permanently removed from the system. (iv) Disasters that an information system should be guarded against: 1. Utility outages e.g. power blackouts. 2. Equipment failure. 3. Viruses i.e. programmed threats. 4. Water, leaks, toxic spills. 5. Foreign intelligence. 6. Human error. 7. Disgruntled employees. 8. Dishonest employees. 9. Greedy employees who sell information for financial gain. 10.Outsider access- hackers, crackers, criminals, terrorists, consultants, ex-consultants, ex-employees, competitors, government agencies, spies (industrial, military, etc), disgruntled customers 11.Acts of God/Natural disasters- earthquakes, floods, hurricanes. 12.Accidents, fires, explosions. (v) Importance of an information security (IS) policy to an organization: 1. To provide guidelines to organizational staff on information security procedures. 2. The presence of of an IS policy shows that the organization is committed to ensuring integrity of the information is handles. This thus enhances a company’s corporate image. 3. An IS policy could be used as evidence to show that an organization did its best to provide information security in cases where law suits are filed against an organization. 4. When followed, an IS policy could actually ensure that the IS is secure from most of the threats it faces. b) (i) Computer This is a generic term applied to a variety of malicious computer programs. These malicious programs affect other computer programs and data in a computer system. (ii) Antivirus tools: __________________________________________________________________ S TRATHMORE UNIVERSITY REVISION KIT 284
Image of page 297
Comprehensive Mock Examinations o Norton anti-virus software; o Mc Afee; o AVG, etc. (iii) Administrative measures that may be used to check the threats of computer viruses: 1. Update virus scanning definitions frequently; 2. Have vendors run demonstrations on their machines, not yours; 3. Shareware should not be used without first scanning the shareware for a virus; 4. Review of anti-virus policies and procedures at least once a year; 5. Field technicians should scan their disks on a test machine before they use any of their disks on the system; 6. The network administrators should use workstation and server anti-virus software; 7.
Image of page 298

Subscribe to view the full document.

Image of page 299
  • Spring '15
  • wauye
  • ........., Systems Development Life Cycle

{[ snackBarMessage ]}

Get FREE access by uploading your study materials

Upload your study materials now and get free access to over 25 million documents.

Upload now for FREE access Or pay now for instant access
Christopher Reinemann
"Before using Course Hero my grade was at 78%. By the end of the semester my grade was at 90%. I could not have done it without all the class material I found."
— Christopher R., University of Rhode Island '15, Course Hero Intern

Ask a question for free

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern