Question: 8- 1 Why are information systems vulnerable to destruction, error, and abuse? List and describe the most common threats against contemporary information systems.

8- 1 Why are information systems vulnerable to destruction, error, and abuse?

• List and describe the most common threats against contemporary information systems.

• Define malware and distinguish among a virus, a worm, and a Trojan horse.

• Define a hacker and explain how hackers create security problems and damage systems.

• Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.

• Define identity theft and phishing and explain why identity theft is such a big problem today.

• Describe the security and system reliability problems employees create.

• Explain how software defects affect system reliability and security.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Experiencing MIS Questions!