Chapter 8 Flashcards
1
Q
Protecting IS requires
A
Training, Published procedures Use of specific technologies
2
Q
Why are IS vulnerable
A
Hardware problems, Software problems Loss or theft of devices
3
Q
Vulnerabilities to the internet
A
It’s open to anyone, email, some things are unencrypted