Chapter 8 Flashcards

1
Q

Protecting IS requires

A

Training, Published procedures Use of specific technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are IS vulnerable

A

Hardware problems, Software problems Loss or theft of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerabilities to the internet

A

It’s open to anyone, email, some things are unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly