9781285425436_Solutions_ch10 /Electronic Commerce, 11th Edition 9781285425436
Review Questions 1. In a paragraph, explain why early computer security efforts focused on controlling the physical environment in which computers operated. Answer: When businesses began using computers, they adopted many of the military’s security methods. They established security by using physical controls over access to computers. Alarmed doors and windows, guards, security badges to admit people to sensitive areas, and surveillance cameras were the tools used to secure computers. Back then, interactions between people and computers were limited to the terminals of large mainframe computers. There were very few networks of computers and those that existed did not extend outside the organization to which they belonged. Thus, computer security could be accomplished by managing the activities of the few people who had access to terminals or the computer room. 2. Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would place in Quadrant III and explain why you would classify them as Quadrant III threats. Answer: In the figure, Quadrant II represents threats that are deemed high risk and very likely to occur. Threats include impostors, eavesdroppers, and thieves. An eavesdropper, in this context, is a person or device that can listen in on and copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers. A cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems – usually with the intent of stealing information or damaging the information, the system’s software, or even the system’s hardware. 3. Write a paragraph in which you provide one example of an integrity violation. Answer: An integrity violation occurs, for example, when an e-mail message is intercepted and its contents a
Written for
- Institution
- Aib College Of Business
- Module
- BA 2663Course name
Document information
- Uploaded on
- October 18, 2022
- Number of pages
- 9
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
ba 2663
Also available in package deal