Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayTechnology
Pages:
3 pages/≈825 words
Sources:
Level:
Harvard
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Business information system (Essay Sample)

Instructions:
<p>Project description follow the instructios that i uploaded Assignment (Remember to use in-text citations to avoid plagiarism) Q1. Define security, threat, exposure and vulnerability in relation to Information Systems security. Identify which components of a computer based information system must be protected by the information system security. (200 words) Insert your answer here Q2. Explain malware and the 3 major categories of software attacks. Include definitions of a logic bomb, back door, denial of service attack and distributed denial of service attack. (200 words) Insert your answer here Q3. Define and discuss the major categories of information security controls. Provide 2 examples of each. (200 words) Insert your answer here Q4. Define a business continuity plan contrasting a cold, warm and hot site. (200 words)</p> source..
Content:
Business Information System
By student’s name
Course code+ name
Professor’s name
University name
City, state
Date of submission
Q1. Define security, threat, exposure and vulnerability in relation to Information Systems security. Identify which components of a computer based information system must be protected by the information system security.
In regard to information systems security, the term security can be defined as the degree of protection from, or resistance to harm. As noted by Wikipedia the free encyclopedia, “it applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization”
According to Straub and Goodman et al. (2008) threat is a method that is used to provoke or stir up a risk that can be dangerous. Vulnerability on the other hand is any weak point in a target that can potentially be utilized by a security threat while exposure is the act of being subjected to a security threat or being subjected to a threat.
Russell and Deborah et al. (1991) clearly stated that various components of a computer based information system have to be protected by the information system security. This includes the system access which controls the access to that system. It determines who is allowed to access the computer based information system by checking and verifying whether whoever is logged in to the system is legitimate or not. The system completes that transaction in two steps; identification and authentication according to Russell and Deborah et al. (1991)
The second component of a computer based information system that must be protected is data access as portrayed by Clifton and Sutcliffe et al. (1994). Data should be protected in the sense that those accessing the data should be verified by the system before transacting any business with the system. It is completed in two steps that is: discretionary access control and mandatory access control.
Malware, a short form for malicious software, refers to a software programs that are designed specifically to disrupt computer operations, gather important and sensitive data or information, perform unwanted actions to a computer or even gain access to computer based information systems.
Q2. Explain malware and the 3 major categories of software attacks. Include definitions of a logic bomb, back door, denial of service attack and distributed denial of service attack.
According to techterms.com malware includes: computer viruses, worms, Trojan horses and spyware which are very hostile and intrusive software. Users rely on other software to counter the malware. Such software includes: firewalls, antivirus and anti-malware.
Christodorescu (2007) stipulates that a logic bomb is a computer malware that remains hidden in a software system and only sets off a malicious function when certain specified conditions are met. It is normally a piece of code, deliberately inserted into a software system.
According to Thompson and Chase (2005), another malware is called backdoor which is computer software that enables the users to bypass the normal authentication, thus get to a position of accessing a computer information system illegally. The backdoor may disguise itself in an installed program such as Back Orifice, or may subvert the entire system using ‘Rookit’.
A denial of service is a malicious act of tryin...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Disruptive Innovation at Skype
    Description: Disruptive Innovation at Skype Technology Essay Master's level...
    11 pages/≈3025 words| Harvard | Technology | Essay |
  • 3D Printer in Building a Houe
    Description: 3D Printer in Building a House Technology Essay...
    6 pages/≈1650 words| Harvard | Technology | Essay |
  • How has New Technology Changed the Concept of Museum
    Description: In the wake of new and sophisticated technology in the modern age, the museum fraternity has not been left behind as a benefactor...
    9 pages/≈2475 words| Harvard | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!