100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

9781285425436_Solutions_ch10 /Electronic Commerce, 11th Edition 9781285425436

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
18-10-2022
Written in
2022/2023

Review Questions 1. In a paragraph, explain why early computer security efforts focused on controlling the physical environment in which computers operated. Answer: When businesses began using computers, they adopted many of the military’s security methods. They established security by using physical controls over access to computers. Alarmed doors and windows, guards, security badges to admit people to sensitive areas, and surveillance cameras were the tools used to secure computers. Back then, interactions between people and computers were limited to the terminals of large mainframe computers. There were very few networks of computers and those that existed did not extend outside the organization to which they belonged. Thus, computer security could be accomplished by managing the activities of the few people who had access to terminals or the computer room. 2. Refer to Figure 10-1. In two paragraphs, identify and briefly describe two threats that you would place in Quadrant III and explain why you would classify them as Quadrant III threats. Answer: In the figure, Quadrant II represents threats that are deemed high risk and very likely to occur. Threats include impostors, eavesdroppers, and thieves. An eavesdropper, in this context, is a person or device that can listen in on and copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers. A cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems – usually with the intent of stealing information or damaging the information, the system’s software, or even the system’s hardware. 3. Write a paragraph in which you provide one example of an integrity violation. Answer: An integrity violation occurs, for example, when an e-mail message is intercepted and its contents a

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 18, 2022
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
greatsolutions Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
359
Member since
3 year
Number of followers
286
Documents
4080
Last sold
1 day ago
greatsolutions

Expertise in Nursing, Mathematics, History, Psychology, Economics, Biology etc,. My Work contains the latest, updated Exam Solutions, Study Guides, Notes 100% verified Guarantee Top Grades.

3.5

57 reviews

5
25
4
9
3
6
2
3
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions