MIS: Chapter 10 Stimulation
You consider installing a firewall or multiple firewalls as technical safeguards for secure access to the database. How many firewalls will you install?
A perimeter firewall and an internal firewall
What is your first step in implementing GearOn's improved security?
Develop a company-wide security policy.
What is the most effective way to begin setting up human security safeguards?
Document the security sensitivity for each position
Several employees come to you complaining that the passwords they must use are too long, too complex, and must be changed too often. What do you tell them?
Employees will have to accept this as a part of their job.
What technical safeguards will you use to allow GearOn employees to securely access the database that stores members' credit card data?
Smart card and pin
You also look into another recent data security problem GearUp faced when many customers were denied service from its web site after IT ran a software update at peak usage time. How can you characterize the cause of this problem?
human error
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards you will take. At GearUp, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. What kind of computer crime did GearUp face?
sniffing