Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

MIS 180 EXAM 3 Meader Latest study Guide.

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A
Geüpload op
21-03-2025
Geschreven in
2024/2025

MIS 180 EXAM 3 Meader Latest study Guide.

Instelling
NIFA
Vak
NIFA

Voorbeeld van de inhoud

MIS 180 EXAM 3 Meader Latest study Guide
External Treats -

✅ -Weather. These affect seasonal businesses that depend on good conditions.

-The economy. If you sell something consumers need in any economy, you will fare better than
others.

-Material shortage. Tensions in an oil-producing country result in big price hikes, raising production
costs for plastics manufacturers, trucking firms and others.

-Your computer system is hacked. This can knock your website out for days during a crucial selling
period.

-Employment in your industry is strong. This can make it hard to find skilled workers.

-Market demand dries up. Think Blockbuster falling behind Netflix because of its late start streaming
content.



Internal Treats -

✅ Policies not followed, data, internal controls, system development, malicious employees



-Untrustworthy Employees - Considering that employees have direct access to your business data,
systems and hardware, the possibility of dealing with internal theft cases that involve data and even
equipment should never be taken lightly.

-Internal Business Data Theft - Laptops, mobile devices, tablets and other devices are entrusted to
employees with the most sensitive information about the organization.

Considering that these devices contain critical company documents and data, unauthorized access
could be damaging to your business.

-Attacks on Physical Business Systems - Many businesses overlook the importance of securing their
physical network and server room to prevent unauthorized personnel from gaining access.



According to one study, on average, how much does it cost a company when a security threat
becomes reality for a company resulting in downtime? -

✅ According to the Aberdeen Report, the average cost of downtime is $260,000 per hour.



Be able to name and describe the three levels of system security -

✅ 1. Data Access Policies and Controls - Protection of the information itself (Who/what can access
databases and what can they do with those databases?)

, 2. Application Access Control - Protection of the computer on which the information is stored (Which
applications can do CRUD on which data? Who can use those applications?)

3. Network and Host Access Control - Protection of the network to which the computer is connected
(Who may access the resources on our network? Intranet? Extranet?)



Common security treats -

✅ Malware

Phishing

Social Engineering

Ransomware

Trojan Horse



Malware -

✅ "malicious software," is an umbrella term that describes any malicious program or code that is
harmful to systems. It seeks to invade, damage, or disable computers, computer systems, networks,
tablets, and mobile devices, often by taking partial control over a device's operations. general term
covering all the different types of threats to your computer safety (ex: viruses, spyware, worms, etc.)



Know the five feasibility studies in SDLC (Class 14a deck), and what the focus of each is. (system
development life style) -

✅ Organizational: Will / can the organization use the system?

Technical: Is the technology available and easy enough to use?

Schedule: Can we get the system into production soon enough?

Economic: Is the proposed system affordable and worth the investment?

Legal: Does this proposed project violate any laws or regulations?



Social Engineering -

✅ Social engineering is the art of manipulating people so they give up confidential information. The
types of information these criminals are seeking can vary, but when individuals are targeted the
criminals are usually trying to trick you into giving them your passwords or bank information, or
access your computer to secretly install malicious software-that will give them access to your
passwords and bank information as well as giving them control over your computer.



Non-technical strategy relying on human interaction and often involves tricking people into breaking
telling their passwords

Geschreven voor

Instelling
NIFA
Vak
NIFA

Documentinformatie

Geüpload op
21 maart 2025
Aantal pagina's
11
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
academicmaster Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
772
Lid sinds
5 jaar
Aantal volgers
676
Documenten
6001
Laatst verkocht
2 weken geleden
MIDTERM & FINALS

Get all latest Quizzes, Test Banks, Midterm and Final Exams. Ace your Exams with My Papers Guaranteed to help you score A in everything.

3.9

111 beoordelingen

5
60
4
16
3
16
2
7
1
12

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen