All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
principles of information security
Questions and Answers of
Principles Of Information Security
Identify four drivers that help set the information systems organization strategy.
Identify three ways the IS organization can be perceived by the rest of the organization and explain how that perception can affect the IS strategy.
Identify six non-technical skills needed to be an effective information system worker.
Identify two benefits of obtaining a certification in an IS subject area.
How is the IS organization at your work or university perceived by the rest of the organization? How has this influenced the IS strategy and what the organization has been able to accomplish?
Provide four reasons why computer incidents are so prevalent. Which of these do you think is the most significant? Why?
You and your team have been hired to improve the computer security of the computer labs at the business college of a small local university. Identify the four classes of perpetrators most likely to
Deloitte is one of the biggest professional services companies in the world based on both revenue ($38.8 billion in 2017) and number of professionals (over 263,000). It provides audit, tax,
List the four perpetrators most likely to initiate a cyberattack.
Have you and your team members conduct a security self-assessment of your computer and usage habits. What common issues do you find? How can you go about eliminating these issues? Do you expect that
What is the meaning of attack vector?
Identify three commonly used attack vectors.
List five cyberattacks that pose serious threats to an organization.
List all the likely consequences of a major data breach. Which of these are likely to be the most serious and long lasting?
Identify five federal laws aimed at preventing computer crime.
Discuss how the CIS security triad can be implemented at the organizational level to safeguard against cyberattacks.
Use Table 2.6 to conduct a security self-assessment. Identify specific follow-up actions you need to take. Data in Table 2.6 Security assessment question Do you have the most current version of
You are going to perform a security risk assessment for your small company. What steps must be taken?
Deciding if a cyberattack is serious enough to warrant shutting down or disconnecting a critical system from the network is an action associated with which action of the response plan?
What actions can a managed security service provider take to improve the security of an organization?
Define the term computer forensics.
You are a member of the HR organization of a large consumer goods manufacturing company. Over lunch one day, a friend of yours who works in the warehouse mentions that video surveillance cameras have
It is the year 2026 and you are one of five Gotham City council members. Violent crime has been a serious problem in your city for decades with more than 650 homicides/year. The city is considering
The Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in
Explain the difference between ethical and legal.
You are a new hire at a large software firm and have been working overtime for the last two months trying to complete the final testing of a new software release for the firm’s flagship product,
You and your team members are setting up a Web site that offers coloring books and art supplies to young children in the 4–13 age range. Develop a list of actions needed to ensure that your Web
You are a member of the human resources group of an IT consulting firm with some three dozen consultants. You are considering initiating a program to encourage more of the consultants to join
Fostering good business practices and protecting the organization and its employees from legal action are two reasons for an organization to promote a work environment in which employees are
List the steps within the ethical decision-making process.
What are the two key elements of an organization’s code of ethics?
Summarize the differences between U.S. and EU fair information practices.
Identify three subject areas where federal statutes have been implemented to protect the personal data of U.S. citizens.
Following a professional code of ethics can improve ethical decision making. True or False?
What are four steps you can take to protect your personal privacy?
Discuss the tradeoffs between information security and privacy.
Discuss why it is said that U.S. federal statutes protect citizens from government surveillance but at the same time authorize the government to collect such data.
What are the key points of the First Amendment in terms of protecting our freedom of speech?
Describe how Section 230 of the Communications Decency Act protects social media networks.
What measures are social media networks taking to address defamation, hate speech, and pornography on the Internet?
What are the differences between a high-quality software system and a safety-critical system?
Identify three measures taken during the development of a safety-critical system that cause such systems to cost more and take longer to complete.
Identify two ethical dilemmas that software developers face when building high-quality or safety-critical systems.
You are a new buyer in the Purchasing organization of a large multinational firm with operations in North America, Europe, and Asia. One of your responsibilities includes working with the information
You and the members of your team have been assigned to evaluate the economic feasibility of upgrading your organization’s server farm from a collection of various models of stand-alone computers to
You are a member of your company’s finance function and have been assigned to work with a multi-functional team to assess the reliability of your organization’s large data center. What other
Facebook is a social networking Web site and service where users can post comments, share photographs and links to news or other interesting content on the Web, play games, chat live, and even stream
What fundamental hardware component provides the processor with a working storage area to hold program instructions and data?
Your organization is considering using software from a software manufacturer that offers three different licensing options: (1) A perpetual license at a cost of $3,750 with an upgrade to the
With the other members of your team, identify three humanitarian causes or scientific programs that could benefit from grid computing. For each cause or program, identify a specific goal to be
What is the role of the processor of a computer?
Explain the difference between multiprocessing, parallel processing, and grid computing.
The single-user portable class of computers includes which commonly used four subclasses of computers?
Which class of computer includes servers, mainframes, and supercomputers?
What subclass of computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage?
Identify three features that distinguish tier 1, 2, 3, and 4 data centers.
State three primary goals of the “green computing” program.
Name two basic kinds of software and identify their associated subclasses.
Identify at least four functions performed by the operating system.
State three cost savings benefits associated with server virtualization.
Describe how the service-oriented architecture approach is used to build software and microservices.
Identify three advantages of off-the-shelf software versus proprietary software.
State four key advantages of the software as a service model.
Give an example of how application software is used in the workgroup sphere of influence.
What are programming languages used for other than to build application software, systems software, embedded systems, and Web sites?
Identify the three primary types of end user license agreements.
In comparison to licensed software, how is open-source software used and supported?
Ticketmaster is a global ticket retailer selling hundreds of millions of tickets to every type of show and venue with total revenue exceeding $8 billion/year. In 2010, it merged with Live Nation to
Describe the role of a database administrator. What skills, training, and experiences are necessary to fulfill this role? Create a fictitious resume that would be sure to get the candidate strong
By the year 2021, the European Union will have a database of fingerprints, photographs for facial recognition, passport numbers and birth dates of all its 350 million citizens. Data that are
Explain the difference between data, information, and knowledge.
Dice.com is one of many career Web sites that cater to those pursuing technical careers. Go to the Web site, enter “database administrator” in the search box, and read eight of the search
What are six benefits of using high-quality data?
Define the term database. Define the term database management system. Identify six functions performed by the database management system.
What roles do database schema, data definition language, and data manipulation play?
What is the purpose of data cleansing?
You are working with a database administrator to design a new customer comments database. What seven key questions must be answered to perform a good design?
What are the six fundamental characteristics of a relational database model?
Why might an organization wish to go through the process of database normalization for key operational databases?
What are the benefits associated with enforcement of the ACID properties of SQL databases?
Use one of the BI/analytics techniques to find the optimal solution to this problem. You make custom T-shirts with inspirational sayings on them. You just found out about a community flea market sale
State two reasons why an organization may wish to implement Database-as-a-Service. Can you identify any potential issues with this approach?
In your own words, describe the difference between data management and data governance.
What three factors are driving the need for data management?
How would you define the role of the database administrator?
Distinguish between the key responsibilities of the data governance team and those of the database administrator.
Identify the five primary characteristics associated with big data discussed in this chapter.
Imagine that you and your team have been hired by the football coach at the local university to develop a process to predict the academic success of students being considered for athletic
You are a certified financial planner working for a large bank that specializes in managing the retirement funds of its customers. One of the most frequently asked questions from your clients is
Early in this century, the Oakland Athletics used readily available traditional player performance statistics in new ways to decide which players to put on the field, and this change led to better
This chapter presented five key challenges associated with big data. Propose a sixth key challenge. Why do you believe this poses a major challenge?
You and many of your classmates are mourning the loss of one of your college friends. Your friend was highly successful in the business world and was a true humanitarian devoting much of his time and
How does a data lake differ from a data warehouse? How does a data mart differ from a data lake, from a data warehouse? Briefly discuss any experience you have working with a data mart, data
Briefly describe the purpose of each step in the ETL process. Would the purchase of high-quality data from a reputable third-party obliviate the need for any of the steps in the ETL process? Explain.
In what ways is an SQL database different from a NoSQL database?
Identify the two primary components of the Hadoop environment and the role that each plays.
What is the primary reason an organization might elect to employ an in-memory database to process big data?
The terms business intelligence and analytics are often used interchangeably. Are they the same or different? Explain.
How would you describe the role of a data scientist? Is such a role of any interest to you? Why or why not?
Which broad category of BI/analytics might Walmart employ to analyze the flow of shoppers through its stores? What might be the purpose of such an analysis? What broad category of BI/ analytics might
Showing 100 - 200
of 746
1
2
3
4
5
6
7
8