Systems Analysis and Design 5.28-5.33 I need The Best answer for study please. T
ID: 399262 • Letter: S
Question
Systems Analysis and Design
5.28-5.33
I need The Best answer for study please.
Thanks
Explanation / Answer
5.28 -
Information systems are directly based on digital Technologies which are vulnerable to destruction as well as error and abuse. This type of systems used in data warehouse or big data management to improve the overall availability of data management programs which is very vulnerable as devices can be unreliable. Hacking is also called the most important factor which is being prominent at current day state. Hacking directly exposes all the information stored in the information systems to the outer world which is very harmful in terms of operation of our organisation. As this data could be disastrous for a firm or its customers.
Hacking can be very dangerous for any organisation as it directly increases the chances of the information leak to the competitors as well as to the other factors which could lead to a disastrous position for the organisation in terms of If the data goes in the wrong hands. Sometimes hacking also relates with taking run some from the organisations to unlock the specific computers are the information systems which reduces the overall profits of the organisation as this type of approach would require extra expenses in form of providing ransom to hackers.
Example -
Once my email account was hacked by an unknown hacker who asked for ransom in exchange of providing the password. I reported the same to the cyber crime department and later my account was recovered and the hacker was captured by the cyber crime department as they were able to track the location using the IP address used to login into my email account.
I used to work at an FM station as an internal and the computers in the workplace were affected by ransom virus. All the files inside the computers were encrypted and it was asking for a password in form of exchange for an amount. As there was no way out to get the specific data by without paying ransom, our organisation paid $200 to the hackers for each and every computer inside your organisation to obtain password for the data.
P.S.- please use a separate Threads to ask multiple long questions in one go.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.