Free Essay

Computer Info

In: Computers and Technology

Submitted By jimnoel
Words 715
Pages 3
1. What are the six focuses of information security today?

The six main focuses of information security today are data, networks, procedures, people, hardware, and software. This is what anyone in the field of information security needs to know to be able to adequately protect the system and its information.

2. What are the differences between “viruses”, “worms”, and “Trojan horses” as examples of malicious software?

A virus is malicious code which will lower or stop system performances. A worm on the other hand is a special type of virus that spread through the memory to avoid detection and will consume the computers resources. a Trojan horse is any type of malicious software that uses a trigger to activate, such as opening a certain program or reaching a certain date.

3. Explain the different with regard to power “irregularities” and the impact that each may have on the ability for a business to function with its information systems.

the first type of power irregularities are called spikes or surges. these are sudden increases in voltage through power lines. Most systems are protected from these surges quite easily with the use of surge protectors making surges not a big threat. Another form of power irregulation is sags or brownouts. A brownout or sag is a drop in voltage in an electrical power supply. Brownouts can cause poor performance of equipment or even incorrect operation. the last power irregulation is called blackouts, or fault. Blackouts, like brownouts, are a drop in voltage of an electrical power supply but unlike brownouts which are quick a blackout could last days. Any company could be in trouble if there information systems ever went down for days at a time.

4. What are the “forces of nature” which could cause interruption in information processing for a business?

The forces of nature which could cause interuption of information processing are earthquakes, fires, floods, hurricanes, lightning, landslide, tornado, tsunami, electrical discharge, and even dust.

5. Give three examples of potential attacks against a business for which a business must protect itself?

One threat a business must protect itself against is trespassing or unauthorized access of the information system. this can be prevented by making secure passwords that change every so often. Another threat business have to deal with is vandalism. Business must make sure disgruntled employees don't try to smash computers or hard drives with valuable information on them. This also relates to the third threat of theft. Businesses do not want employees stealing valuable information from the company.

6. What has been the primary use of “computer fraud and abuse act” of 1986?

The Computer Fraud and Abuse Act of 1986 made it illegal to use computers to commit fraud by using technology to misrepresent one's identity. It is most commonly used to prosecute cases of identity theft and credit card theft.

7. What has been the impact of the HIPPA act of 1996 on individuals?

The Health Insurance Probability Act of 1996 required hospitals and doctors to share and allow access to authorized medical information. This act was tested by granting access to medical information about a spouse who had contracted AIDs to their unknowing significant other.

8. What has been the impact on business of the Sarbanes-Oxley Act of 1999?
Who was the act designed to protect?

The Sarbanes-Oxley Act of 1999 was established to apply to the Enron case for use of computers to provide false information to investors. This act protects investors so they do not unknowingly invest in bad or failing companies.

9. What is the role of “risk assessment” in determining the amount of money a business should spend to protect itself from security threats?

Management will use risk assessment to consider the probability of each risk occuring and the likely extent of the damage should it occur. They will then determine how much money they are willing to spend to avoid the high priority risks.

10. What is the difference between “benchmarking”, audits, and best practices in the security industry?

Benchmarking is the process of looking at what other trusted organizations are doing to reduce and control risk and then following them. Annual audits are used to measure the progress of the plan and to make sure no risk changes have occurred.

Similar Documents

Free Essay

Computer Info

..."The Beauty and Joy of Computing: Computer Science for Everyone", Constructionism 2012, Athens. About the development of CS 10, Berkeley's new CS breadth course for non-majors. Why Structure and Interpretation of Computer Programs matters In 2011, to celebrate the 150th anniversary of MIT, the Boston Globe made a list of the most important MIT innovations, and they asked me to explain the importance of SICP. This is what I sent them. "Bringing 'No Ceiling' to Scratch: Can One Language Serve Kids and Computer Scientists?" (with Jens Mönig, a talk at the Constructionism 2010 conference in Paris). Scratch is the brilliant grandchild of Logo, from the MIT Media Lab, that uses drag-and-drop visual programming to achieve, truly at last, the "no threshold" half of Logo's famous promise, combined with a half-million-strong social network of kid programmers sharing projects and working collaboratively. But Scratch deliberately drops the "no ceiling" part. How hard would it be to do both at once? Not hard at all, we think, if we remember Lisp's core idea of procedure as data. BYOB (Build Your Own Blocks) is an experimental implementation of this goal. "Speech at UCB CS Graduation, 2005"At Berkeley every department has its own graduation ceremony. At the one for the Computer Science majors in the College of Letters and Science, there are a bunch of student speakers, then a faculty speaker, and then a famous-outsider speaker. This year I gave the faculty speech, about the sorry state...

Words: 1079 - Pages: 5

Premium Essay

Computer Info

...system cool off, and restarting the computer to verify whether the problem repeats itself. Check the following if overheating seems to be the problem: * Check the heatsink and fan for placement and condition. * Verify that thermal paste or a thermal pad has been used between the processor and the heat sink. * Verify that the heatsink is firmly attached to the CPU. * Verify that the CPU is properly seated in its socket. * Verify that system case fans are working and that the case and expansion slots are in place. * If the CPU is an older Pentium without a heat sink or fan, add one. * If the computer is not overheating, but has this symptom, the problem could be the clock jumpers on the motherboard or system timers (in BIOS) are set incorrectly for the processor. * PC sounds a POST beep code indicating a CPU fault upon boot-up: * Verify that the CPU is receiving sufficient power by checking the power outputs. * If these are good, replace the CPU. * If the fault remains, the problem is with the motherboard. * PC crashes on startup or when running a software application or certain group of applications: * Run repetitive test using diagnostic software. * After replacing a seemingly faulty CPU and the symptom remains, run similar tests on the motherboard and chipset. * Do not forget to check for a corrupt file in the software. If the computer boots, but the processor is running...

Words: 329 - Pages: 2

Free Essay

What Is Infor Abot?

...The domain name info is a generic top-level domain (gTLD) in the Domain Name System (DNS) of the Internet. The name is derived from information indicating that the domain is intended for informative Internet resources, although registration requirements do not prescribe any theme orientation. The info TLD was a response to ICANN's highly publicized announcement[citation needed], in late 2000, of a phased release of seven new generic top-level domains. The event was the first addition of major gTLDs since the Domain Name System was developed in the 1980s. The seven new gTLDs, selected from over 180 proposals, were meant in part to take the pressure off the com domain.[1] The info domain has been the most successful of the seven new domain names, with over 5.2 million domain names in the registry as of April 2008. After the September 11, 2001 attacks in the United States, the Metropolitan Transportation Authority of New York switched to the easier to remember mta.info website to lead users to latest information on schedules and route changes on the area's transportation services. Even in 2013, a website, Current Score info, was formed to provide current score of Football and Cricket across India. ICANN and Afilias have also sealed an agreement for country names to be reserved by ICANN under resolution 01.92.[2] info is an unrestricted domain, meaning that anyone can obtain a second-level domain under info for any purpose, similar to the com, net or org domains. This is in contrast...

Words: 333 - Pages: 2

Premium Essay

Bp14 Computer Info Systems

...1. One of the problems with DIA’s baggage system was inadequate testing. Describe the different types of tests DIA could have used to help ensure its baggage system’s success. I think the type of tests that would’ve helped DIA the most would have been: a) Application (or system) testing: This would have been a simple matter of testing the system altogether. Actually running the system before running it in front of the press would have been quite a good idea. It lets the system show its faults before making it public. b) Integration Testing: This is to make sure if the software components or units work right (by exposing the faults). This would have also been good because it would have tested the functionality. c) Unit Testing: This would have been good to check every unit separately and see how they worked separately without checking just how they worked together. 2. Evaluate the different implementation approaches. Which one would have most significantly increased the chances of the project’s success? I think the implementation approach that would have increased the chances of the project’s success would have been Phased Implementation. With this implementation approach, they would have been able to pinpoint the issues that the system was having as they were creating it and would have saved them the embarrassing exposure of their mistakes. This approach implements the system in phases until it’s evident it performs correctly. This gives the assurance that every single...

Words: 522 - Pages: 3

Premium Essay

Business

...Lesson 04 Decision Making Solutions Solved Problem #1: see text book Solved Problem #2: see textbook Solved Problem #3: see textbook Solved Problem #6: (costs) see textbook #1: A small building contractor has recently experienced two successive years in which work opportunities exceeded the firm’s capacity. The contractor must now make a decision on capacity for the next year. Estimated profits under each of the two possible states of nature are shown in the table below. The units are in $ thousands. Next Year’s Demand Low High 50 60 20 80 40 70 -AlternativesDo nothing Expand Subcontract a. Calculate the regret table. -AlternativesDo nothing Expand Subcontract Low High 0 30 10 20 0 10 Determine the alternative and payoff /regret which should be selected for the decision criteria in each of the following questions. b. Maximax (best of all possible alternatives)? Expand – payoff $80 thousand c. Maximin (best of all the worst alternatives)? Do nothing – payoff $50 thousand d. Laplace (best of the expected payoffs for all alternatives)? Tie between Do nothing and Subcontract – Payoff $55 thousand e. Minimax regret (least of all the maximum regrets for each alternative)? Subcontract – Regret $10 thousand #2: Refer to problem 1. Suppose after a certain amount of discussion, the contractor is able to subjectively assess the probabilities of low and high demand: P(Low) = .3, P(High) = .7. a. Determine the expected profit fore each alternative? Do nothing - $57 thousand...

Words: 476 - Pages: 2

Premium Essay

Car Services

...Problem: Car Services Ltd (CSL) rends motor vehicle breakdown recovery service to its members. It attracts new members through a television advertising campaign that encourages potential clients to telephone a free call number for further information and the opportunity to immediately enroll with a credit card. Members are offered the choice of three levels of annual service contract in descending order of coverage and price: Gold, Silver and Standard. The telephone inquiries come through to a call centre staffed by CSL employees at the company’s premises who are paid a basic salary and a bonus of each new member that they successfully enroll. Located in the same building on another floor is the Car Hospital (CH) team who take the calls from the stranded motorists and arrange for a franchised garage to deal with the breakdown. These garages are independently owned and CSL pay them a fee for every callout that they undertake. CSL has recently (after January 2004) commenced employing trained mechanics on enhanced salaries to dispense technical advice to members on the telephone in the hope that a proportion of the call-outs to franchised garages will be avoided. Detailed information on costs, revenues, business activity and staff is displayed in the following tables. Table 1 Cost, Revenue and business Activity data for 2004 | |Gold |Silver |Standard | |Annual...

Words: 1956 - Pages: 8

Premium Essay

The Architecture Company

...The Architecture Company An architecture company was invited to submit, until the end of February, two proposals regarding two new university buildings. The preparation of a proposal for the first building involves a cost of forty (40) thousand Euros. Preparing a proposal for the second building costs twenty (20) thousand Euros. If the proposal for the first building is accepted, the company will earn one hundred and twenty (120) thousand Euros. If the proposal for the second building is accepted the earnings will be seventy (70) thousand Euros. The final profit is given by the total earnings (resulting from the accepted proposals) minus the total costs of preparation of the proposals. The architecture company has the option to submit no proposal, to submit a proposal for only one of the buildings, or to submit proposals for the two buildings. Any of the submitted proposals may be accepted or rejected. If two proposals are submitted, it is possible that none is accepted, only one is accepted, or both are accepted. In the particular case that both proposals are submitted and both are accepted then there will be severe problems implementing both projects simultaneously implying an extra cost of fifty (50) thousand Euros (to be deducted from profits). There is a 50% probability that a proposal for the first building is accepted. The probability that a proposal for the second building is accepted is 50%. The acceptance of one proposal is independent of the acceptance...

Words: 733 - Pages: 3

Premium Essay

Unit 7 Project Mm305

...Name: Directions: * The following software may be used: * Excel->Data Analysis * Excel QM * QM for Windows (PC only) * Please make sure to insert your answers, including any charts, graphs, or output, on this document. You may be required to also upload original files from Excel or QM for Windows. * The calculations are not your final answer. A summary/explanation in your own word for each question posed should be included. * Question 6 requires the use of the States Data File. The States Data file is located in Doc Sharing->Instructor Graded Projects. * Be sure to put your name on this document and save it to your computer. Upload this Word document as your Unit 7 submission in the course Drop Box. Submitting Your Project: * Save your project in a location that you will remember and with your full name. When you are ready to submit your project, click on the Dropbox and complete the steps below: * Click the link that says, “Submit an Assignment.” * In the “Submit to Basket” menu, select Unit 7 Project. * In the “Comments” field include your name. * Click the “Add Attachments” button. * Follow the steps listed to attach your Word Document. * You should revisit the Dropbox to view any helpful feedback your instructor has and to retrieve your graded project. * Make sure that you save a copy of your submitted project. 1. Even though independent gasoline stations have been having a difficult...

Words: 1210 - Pages: 5

Premium Essay

Red Brand Case

...6. Is it advisable to purchase any of the available 100,000 lbs of grade A tomatoes? (use the sensitivity report from question 2). If so, (a) how much should we buy? (b) How will the additional tomatoes be used? In order to figure out if we should buy and by how much we should purchase, we made some modifications associated with our model. First of all, we need to add one more decision variable, Additional A, which is the amount of extra grade A tomatoes we decide to purchase. Then we need to change the profit formula to subtract additional purchase cost, which is $0.15*Additional A, the deal Gordon had to purchase up to 100,000 lbs. grade A tomatoes. Also, we need to change the constraint for A grade tomatoes from 600,000 lbs. to (600,000+Additional A) lbs. The last step is to add another constraint to make the decision variable Additional A can be no more than 100,000 lbs. When we ran sensitivity analysis, the shadow price for grade A tomatoes is $0.27, which means when the company increases 1 lb. of grade A tomatoes available in production process, the total profit will increase by $0.27. So as long as the purchase price less than the shadow price, company should purchase extra grade A tomatoes. Moreover, the allowable increase for constraint of amount of grade A tomatoes available is 1,400,000. It means any amount of additional grade A tomatoes under 1,400,000 lbs. will be feasible to purchase to increase profit. Thus it is a good idea to purchase whole 100,000 lbs...

Words: 464 - Pages: 2

Premium Essay

Biam 500 Week 2 Lab Analysis

...Lab 2 Analysis Sheila Mejia BIAM 500 Prof. Bruning Keller March 13, 2016 Explain the Solver results you obtained for both the initial problem and your sensitivity analysis. The solver results in the initial analysis in my workbook showed that 333 units of the cc7 and 200 units of the cc8 should be produced in order to obtain the maximum of a little over $5 million in profit while still remaining within the given constraints. The constraints included that that MBI Corporation cannot produce more than 200,000 units in its plant and must remain under an $8million dollar budget. MBI Corp. must also meet marketing constraints of at least producing 100 units of cc7 and 200 units of cc8. In the sensitivity analysis we increases the constraints by ten percent and Solver determined that the optimal units MBI should produce is 110 of cc7 and 46 of cc8. Increasing the constraints decreased the number of units produced and decreased the profit by 31%. Thus, the sensitivity analysis helped determine that the current constraints made for a bigger profit while making staying within budget and satisfying other needs within the corporation. Based on the solver results MDI should not increase the parameters of their constraints, at least not by ten percent. What did you learn from the exercise and how is it important to businesses? The lab showed me how analyze a word problem and interpret the numbers using a spreadsheet. It also taught me...

Words: 363 - Pages: 2

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Premium Essay

Asdf

...Advantages of a computer 1. It helps you automate various tasks that cannot do manually. 2. It helps you organize your data and information. 3. It has much more computing and calculating power than an ordinary human. 4. It may help your work to be a lot easier. 5. It can help you communicate with friends, co workers and other contacts. 6. It has many search engines to help you find information quickly. 7. We are able to produce documents with ease because of computers. On typewriters as a comparison, one would either need whiteout or to go back and type over a mistaken letter or grammar issue. Thus, it is easier to correct typed documents. Limitation of a computer 1. The computer can only perform the tasks you ask it to. You cannot expect a computer to be smarter than the person running it you have to tell the computer what tasks you want it to do. Yes, there are processes in the background, but these run base on present info built into the operating system. 2. A computer cannot generate info by itself. You have to give the computer operation and even new instructions from time to time. Updates for examples are a way to get info to your computer to help streamline its functionality, but you still have to feed it that info by having an internet connection and automatic updates. 3. If you give the computer wrong data it is going to give you wrong information. The computer can only work with what you give it. It’s just...

Words: 365 - Pages: 2

Free Essay

Information Technology

...store, and distribute info to support decision making and control in an organization –Six building blocks of computers: input, output, memory, arithmetic/logic unit, control unit and files. Control unit and arithmetic/logical unit together known as CPU (central processing unit). –Arithmetic/Logic Unit: carries out mathematical operations and logical comparisons, consist of very large scale integrated circuits, can perform billion operations per second, numbers taking from memories as input and results stored in memory as output. -Control Unit: controls the other five compo of the comp system, enables the comp to take advantage of speed and capacity of its other compo, list of operations called a program, these operations read from memory, interpreted and carried out one at a time (stored program concept). –Cache memory: high speed, high cost storage, used as intermediary between control unit and main memory, compensates for speed mismatches built into the comp system. –Multiple processor configurations: a comp system usually contains more than one processor, dual processor contain two physical separate processors as two separate chips, dual core contain two complete processors manufactured as a single chip, dual processor are better and faster. –Input: devices allow users to enter data into the comp for processing, common devices: keyboard, disk drive, magnetic ink character, etc) –Terminal: Simpler than PC, design for input and output, connected to computer with telecommunication...

Words: 3433 - Pages: 14

Premium Essay

Tax Accounting Chapter 10

...Boston, Steve has been busy creating and managing his new company, Teton Mountaineering (TM), which is based out of a small town in Wyoming. In the process of doing so, TM has acquired various types of assets. Below is a list of assets acquired during 2012: Asset Cost Date Place in Service Office furniture $10,000 02/03/2012 Machinery 560,000 07/22/2012 Used delivery truck* 15,000 08/17/2012 *Not considered a luxury automobile, thus not subject to the luxury automobile limitations During 2012, TM had huge success (and had no §179 limitations) and Steve acquired more assets the next year to increase its production capacity. These are the assets acquired during 2013: Asset Cost Date Place in Service Computers & Info. System $40,000 03/31/2013 Luxury Auto† 80,000 05/26/2013 Assembly Equipment 475,000 08/15/2013 Storage Building 400,000 11/13/2013 †Used 100% for business purposes. Use 2012 limitations for 2013. TM generated taxable income in 2013 before any §179 expense of $732,500. Required a. Compute 2012 depreciation deductions including §179 expense (ignoring bonus depreciation). b. Compute 2013 depreciation deductions including §179 expense (ignoring bonus depreciation). c. Compute 2013 depreciation deductions including §179 expense, but now assume that Steve would like to take bonus depreciation. d. Ignoring part c, now assume that during 2013, Steve decides to buy a competitor’s assets for...

Words: 749 - Pages: 3

Free Essay

Computer Ethics

...02/25/2014 SP14 CIS-PHI 3270 ETRA SHVETS VARGAS BYRNE PAPER 1 [Document subtitle] Computer Ethics Every day that passes society is becoming more and more dependent on technology, to the point where a majority of people cannot live without gadgets, such a smart phones or tablets. Technology is constantly changing, especially in the past decade, has made the lives of many individuals much more convenient, however it can come with a consequence. The usage of technology has become a key essential in the business world. Computers and cellphones have many applications that are convenient for the users, such as storage for music, school assignments, pictures, games, and many more. Keeping all this information available instantly requires some sort of storage device of platform. Flash drives, hard drives, and cloud storage are some of the most well know storage alternatives that are used. Due to advances in technology the usage of hard drives and flash drives has diminished because of the growing development and improvement of the cloud storage system. The usage of storage systems has been rapidly growing and has been predicted to continue increase during the upcoming years. Although the innovation of new storage systems brings many conveniences to its users, it is exploring new fields of technology in which many unanswered ethical questions have surfaced in society. “One of the first milestones for cloud computing was the arrival of Salesforce.com in 1999, which pioneered...

Words: 1912 - Pages: 8