Reference no: EM131043761
Chapter 4-Ethics, Privacy, and Information Security
1. Why are computer systems so vulnerable?
2. Why should information security be a prime concern to management?
3. Is security a technical issue? A business issue? Both? Support your answer. (Hint: Read Kim Nash, "Why Technology Isn't the Answer to Better Security,"CIO www cio com October 15, 2008.
4. Compare information security in an organization with insuring a house.
5. Why are authentication and authorization important to e-commerce?
6. Why is cross-border cybercrime expanding rapidly? Discuss possible solutions. 7. Discuss why the Sarbanes-Oxley Act is having an impact on information security.
8. What types of user authentication are used at your university and/or place of work? Do these measures seem to be effective? What if a higher level of authentication were implemented? Would it be worth it, or would it decrease productivity?
9. Why are federal authorities so worried about SCADA attacks?
What is the standard deviation of demand during lead time
: What is the standard deviation of demand during lead time? What is the safety stock level that should be carried for the WAMI-1000? What is the reorder point for the WAMI-1000?
|
How plan and conduct appropriate geographical information
: Explain how you would plan and conduct appropriate geographical information analysis of each cases, with the stated goals in mind.
|
Equation that represents the relationship
: Write an equation that represents the relationship between x, the number of hours Katya will have to work and y, the rate she must charge customers to get $1500
|
Probability of guessing the correct number
: Here is a numbers game. You choose a number from 000 to 999 each morning and compare it to the last three digits of the official attendance figures at the nearest racetrack. What is the probability of guessing the correct number at least once if y..
|
Why is cross-border cybercrime expanding rapidly
: What types of user authentication are used at your university and/or place of work? Do these measures seem to be effective? What if a higher level of authentication were implemented? Would it be worth it, or would it decrease productivity?
|
Obituaries of either time or newsweek magazine
: Two or three famous people appear in the obituaries of either Time or Newsweek magazine in each week. Estimate how many famous people die in one year.
|
What is the probability you will roll a double
: You roll two fair dice. What is the probability you will roll a double (two 1's, two 2's, two 03's, and so on)? (round to two decimal places)
|
Suppose sales associate told you the policy costs
: The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $26,000 per year forever. Suppose a sales associate told you the policy costs $471,000. At what interest rate would this be a fair deal?
|
Paying dividends-what is the current share price
: Estes Park Corp. pays a constant $9.20 dividend on its stock. The company will maintain this dividend for the next 8 years and will then cease paying dividends forever. If the required return on this stock is 12 percent, what is the current share pri..
|