All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
information technology management
Questions and Answers of
Information Technology Management
What is the difference between circuit switching and packet switching?
What has been a reaction to the 2014 appeals court decision? Explain.
Explain the functions of switches and routers.
Briefly describe the basic network functions.
Why did the battle over Net neutrality intensify in 2014?
What are the potential abuses of data collected in this way?
What is Net neutrality?
Explain ETL and CDC.
What is Nexus 7?
What are soft costs?
1. All it takes is one compromised ingredient to contaminate food and to put human lives at risk. Delays in communicating contaminated food increase the health risk and fines for violating the Food
Research a botnet attack. Explain how the botnet works and what damage it causes. What preventive methods are offered by security vendors?
What contributes to the rise of global mean temperature?
Compare the various features of broadband wireless networks (e.g., 3G, Wi-Fi, and WiMAX).Visit at least three broadband wireless network vendors.
What is the greenhouse effect?
View the iMindMap Online tutorial on YouTube at http://www.youtube.com/watch?v=EuB0zyV_lJY. Describe the potential value of sharing maps online and synching maps with other computers or devices. What
How does the use of mobile devices contribute to the level of greenhouse gases?
Visit Google Green at http://www.google.com/green/bigpicture. Describe Google’s efforts to minimize the environmental impact of its services. Do you believe that Google can reduce its carbon
What is ICT’s role in global warming?
Why is global warming hotly debated?
Explain the goal of sustainability.
Explain the characteristics of a life out of control.
1. Was cybersecurity a priority at Target? Explain.2. How did lax security impact Target’s sales revenue and profit performance?3. According to experts, how was the data breach executed?4. In
Why do you think government-issued smartphones are a target for data theft and transmission theft?
Many travelers might consider Lieberthal’s method too inconvenient. Clearly, his electronically clean methods are time consuming and expensive. In your opinion, is there a tradeoff between
How important was trust to Madoff’s scheme?
Why was 2013 dubbed the “Year of the Breach”?
Why is cybercrime expanding rapidly? Discuss some possible solutions.
The Wall Street Journal (WSJ.com) has detailed a cyberattack against the U.S. Chamber of Commerce in which e-mails were stolen. Review The Wall Street Journal interactive graphic “China Hackers Hit
Many firms concentrate on the wrong questions and end up throwing a great deal of money and time at minimal security risks while ignoring major vulnerabilities. Why?
1. LinkedIn does not collect the credit card or other financial account information of its members. Why then would profit-motivated hackers be interested in stealing LinkedIn’s stored data? What
Create a list of best cybersecurity practices for travelers based on Lieberthal’s methods.
What else did Madoff rely upon to carry out his fraud?
What causes or contributes to data breaches?
In addition to hackers, what kinds of cybercriminals do organizations need to defend against?
Access the Anti-Phishing Working Group Web site (antiphishing.org) and download the most recent Phishing Activity Trends Report.Describe the recent trends in phishing attacks.
1. What are botnets used for?2. What is needed to get started in the botnet industry? Explain why?3. Given your answers, what should users and organizations do and/or not do to reduce the threat of
What security features are built into Black?
What is a red flag?
Why are cybercriminals so successful?
What are the major motives of cybercriminals?
Why is voice encryption an important digital security measure?
In your opinion, how were so many red flags ignored given the risk that investors faced?
In what ways do users make themselves vulnerable to cybercrimes?
Why is a defense-in-depth model vital to a security smartphone such as Black?
Could such a large investment fraud happen again—or are there internal fraud prevention and detection measures in place that would prevent or stop it from occurring? Explain your answer.
Describe the basic method of a distributed denial-of-service (DDoS) attack.
Why do malware creators alter their malware?
Research vendors of biometrics. Select one vendor, and discuss three of its biometric devices or technologies. Prepare a list of major capabilities. What are the advantages and disadvantages of its
What is a critical infrastructure? List three types of critical infrastructures.
Why should you set a unique password for each website, service, and device that you use?
Assume that the daily probability of a major earthquake in Los Angeles is .07 percent. The chance of your computer center being damaged during such a quake is 5 percent. If the center is damaged, the
What are the motives of hacktivists?
How can malware be stopped from stealing or disclosing data from an organization’s network?
Should an employer notify employees that their usage of computers is being monitored? Why or why not?
What impact might huge fines have on how much a company budgets for IT security defenses?
Why is social engineering a technique used by hackers to gain access to a network?
Why are BYOD, BYOA, and do-not-carry rules important to IT security? Why might users resist such rules?
Explain why APT attacks are difficult to detect.
How can the risk of occupational fraud be decreased?
What are the objectives of cybersecurity?
Why should information control and security be of prime concern to management?
Explain what firewalls protect and what they do not protect.
Explain the three components of the CIA triad.
Why are authentication and authorization important in e-commerce?
What is an attack vector? Give an example.
Some insurance companies will not insure a business unless the firm has a computer disaster recovery plan. Explain why.
What is an exploit? Give an example.
Explain why risk management should involve the following elements: threats, exposure associated with each threat, risk of each threat occurring, cost of controls, and assessment of their
What is a contract hacker?
What are the functions of an IDS and IPS?
Explain authentication and two methods of authentication.
Discuss why the Sarbanes-Oxley Act focuses on internal control. How does that focus influence information security?
Give an example of a weak password and a strong password.
How are phishing attacks done?
What are the four steps in the defense-in-depth IT security model?
Define and give an example of an unintentional threat.
Define and give an example of an intentional threat.
List and define three types of malware.
What are the risks caused by data tampering?
Define botnet and explain its risk.
Explain spear phishing.
How do social networks and cloud computing increase vulnerability?
Why are patches and service packs needed?
What is consumerization of information technology (COIT)?
Why does BYOD raise serious and legitimate areas of concern?
What are two types of mobile biometrics?
Explain rogue app monitoring.
Why is a mobile kill switch or remote wipe capability important?
What are the purposes of do-not-carry rules?
What are the two categories of crime?
Explain fraud and occupational fraud.
What defenses help prevent internal fraud?
What are two red flags of internal fraud?
Explain why data on laptops and computers need to be encrypted.
Explain how identity theft can occur.
Why are internal controls needed?
What federal law requires effective internal controls?
Why do the SEC and FTC impose huge fines for data breaches?
What are the two types of controls in a defense strategy?
Showing 1000 - 1100
of 1319
1
2
3
4
5
6
7
8
9
10
11
12
13
14