SlideShare a Scribd company logo
7 -1 MIS REVIEW QUESTIONS
Why are information systems vulnerable to destruction, error,
and abuse?
List and describe the most common threats against
contemporary information systems.
Define malware and distinguish among a virus, a worm, and a
Trojan horse.
Define a hacker and explain how hackers create security
problems and damage systems.
Define computer crime. Provide two examples of crime in which
computers are targets and two examples in which computers are
used as instruments of crime.
Define identity theft and phishing and explain why identity theft
is such a big problem today.
Describe the security and system reliability problems created by
employees.
Explain how software defects affect system reliability and
security.
What is the business value of security and control?
Explain how security and control provide value for businesses.
Describe the relationship between security and control and
recent U.S. government regulatory requirements and computer
forensics.
What are the components of an organizational framework for
security and control?
Define general controls and describe each type of general
control.
Define application controls and describe each type of
application control.
Describe the function of risk assessment and explain how it is
conducted for information systems.
Define and describe the following: security policy, acceptable
use policy, and identity management.
Explain how MIS auditing promotes security and control.
What are the most important tools and technologies for
safeguarding information resources?
Name and describe three authentication methods.
Describe the roles of firewalls, intrusion detection systems, and
antivirus software in promoting security.
Explain how encryption protects information.
Describe the role of encryption and digital certificates in a
public key infrastructure.
Distinguish between fault tolerance and high-availability
computing, and between di saster recovery planning and
business continuity planning.
Identify and describe the security problems posed by cloud
computing.
Describe measures for improving software quality and
reliability.

More Related Content

PPT
Ia 124 1621324143 ia_124_lecture_01
PPT
Security and Control.ppt
PPTX
Security and control in mis
PPTX
MIS_Session05.pptx
PPTX
Basics of System Security and Tools
PDF
Ijcatr04061002
PPTX
iTM ppt....pptx
Ia 124 1621324143 ia_124_lecture_01
Security and Control.ppt
Security and control in mis
MIS_Session05.pptx
Basics of System Security and Tools
Ijcatr04061002
iTM ppt....pptx

Similar to 7 -1 MIS REVIEW QUESTIONSWhy are information systems vulnerable to.docx (20)

PPTX
9 - Security
PDF
IA 124 Lecture 01 2022 -23-1.pdf hahahah
PDF
Week 09_Cyber security u.pdf
PPTX
Security and control in Management Information System
PPTX
Securing information system (Management Information System)
PPTX
Computing safety
PPT
PDF
InfosecTrain Cybersecurity Analyst Interview Questions
PDF
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
PDF
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
PDF
Cybersecurity Analyst Interview Questions for 2024.pdf
PDF
Cyber Security Analyst Interview Questions: Download our white paper
PPTX
The Demand For Security: information security program
DOCX
1UNIVERSITY OF MARYLAND UNIVERSITY COLLEGEGRADUATE SCH.docx
PPTX
Management Information Systems ( Security and Control.pptx
DOCX
E sec chaptr-1
PDF
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
PPTX
Basic Security Concepts of Computer
PDF
Get Solution Manual for CompTIA Security+ Guide to Network Security Fundament...
PDF
Lecture5
9 - Security
IA 124 Lecture 01 2022 -23-1.pdf hahahah
Week 09_Cyber security u.pdf
Security and control in Management Information System
Securing information system (Management Information System)
Computing safety
InfosecTrain Cybersecurity Analyst Interview Questions
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
Cybersecurity Analyst Interview Questions for 2024.pdf
Cyber Security Analyst Interview Questions: Download our white paper
The Demand For Security: information security program
1UNIVERSITY OF MARYLAND UNIVERSITY COLLEGEGRADUATE SCH.docx
Management Information Systems ( Security and Control.pptx
E sec chaptr-1
Solution Manual for CompTIA Security+ Guide to Network Security Fundamentals,...
Basic Security Concepts of Computer
Get Solution Manual for CompTIA Security+ Guide to Network Security Fundament...
Lecture5
Ad

More from ssuser774ad41 (20)

DOCX
A major producer of plastic in the U.S. is about to expand its busin.docx
DOCX
A key theory explored this week is labeling theory. This assignmen.docx
DOCX
A haiku is __________. (Points 3) a rhyming poem with 1.docx
DOCX
A key element of social-emotional development during infancy and tod.docx
DOCX
A grade 11 class, on a field trip to Montreal, had lunch in a restau.docx
DOCX
A joint committee is[removed]set up to resolve differences in legi.docx
DOCX
A historical case where stare decisis was followed wasPlanned Pa.docx
DOCX
a health issue and its policy in Saudi ArabiaTerm paper• To beg.docx
DOCX
A group working at the University of California, Berkeley has develo.docx
DOCX
A graph…….a.can be used to show either a positive or neg.docx
DOCX
A fundamental assumption for economic analysis is that economic ag.docx
DOCX
a general essay on al capone during the jazz age and the influence h.docx
DOCX
A friend of yours did something wrong and you covered for himher. T.docx
DOCX
A format suggestion for M&M paperLast 1.docx
DOCX
A five page single spaced essay on the novel Corregidora.Paper.docx
DOCX
A five page single spaced essay on the novel Corregidora.P.docx
DOCX
A five page single spaced essay on the novel Corregidora.Due o.docx
DOCX
A family consists of six children all under 12, their parents, and f.docx
DOCX
A few sentencessingle paragraph for each item should be sufficient,.docx
DOCX
A Drug Deal Gone BadThis assignment aims for you to evaluate the.docx
A major producer of plastic in the U.S. is about to expand its busin.docx
A key theory explored this week is labeling theory. This assignmen.docx
A haiku is __________. (Points 3) a rhyming poem with 1.docx
A key element of social-emotional development during infancy and tod.docx
A grade 11 class, on a field trip to Montreal, had lunch in a restau.docx
A joint committee is[removed]set up to resolve differences in legi.docx
A historical case where stare decisis was followed wasPlanned Pa.docx
a health issue and its policy in Saudi ArabiaTerm paper• To beg.docx
A group working at the University of California, Berkeley has develo.docx
A graph…….a.can be used to show either a positive or neg.docx
A fundamental assumption for economic analysis is that economic ag.docx
a general essay on al capone during the jazz age and the influence h.docx
A friend of yours did something wrong and you covered for himher. T.docx
A format suggestion for M&M paperLast 1.docx
A five page single spaced essay on the novel Corregidora.Paper.docx
A five page single spaced essay on the novel Corregidora.P.docx
A five page single spaced essay on the novel Corregidora.Due o.docx
A family consists of six children all under 12, their parents, and f.docx
A few sentencessingle paragraph for each item should be sufficient,.docx
A Drug Deal Gone BadThis assignment aims for you to evaluate the.docx
Ad

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Lesson notes of climatology university.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Presentation on HIE in infants and its manifestations
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
A systematic review of self-coping strategies used by university students to ...
Lesson notes of climatology university.
O7-L3 Supply Chain Operations - ICLT Program
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Presentation on HIE in infants and its manifestations
202450812 BayCHI UCSC-SV 20250812 v17.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial disease of the cardiovascular and lymphatic systems
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

7 -1 MIS REVIEW QUESTIONSWhy are information systems vulnerable to.docx

  • 1. 7 -1 MIS REVIEW QUESTIONS Why are information systems vulnerable to destruction, error, and abuse? List and describe the most common threats against contemporary information systems. Define malware and distinguish among a virus, a worm, and a Trojan horse. Define a hacker and explain how hackers create security problems and damage systems. Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime. Define identity theft and phishing and explain why identity theft is such a big problem today. Describe the security and system reliability problems created by employees. Explain how software defects affect system reliability and security. What is the business value of security and control? Explain how security and control provide value for businesses. Describe the relationship between security and control and recent U.S. government regulatory requirements and computer forensics. What are the components of an organizational framework for security and control? Define general controls and describe each type of general control. Define application controls and describe each type of application control. Describe the function of risk assessment and explain how it is conducted for information systems. Define and describe the following: security policy, acceptable use policy, and identity management. Explain how MIS auditing promotes security and control. What are the most important tools and technologies for
  • 2. safeguarding information resources? Name and describe three authentication methods. Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security. Explain how encryption protects information. Describe the role of encryption and digital certificates in a public key infrastructure. Distinguish between fault tolerance and high-availability computing, and between di saster recovery planning and business continuity planning. Identify and describe the security problems posed by cloud computing. Describe measures for improving software quality and reliability.