Management Information Systems, 12e (Laudon) Chapter 8 Securing Information Systems
1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks. Answer: !"# $iff: 1 Page !ef: 2%& AA'(: "se of I 'A(#: 'omprehension *+ectie: .1 2) 'omputers using ca+le modems to connect to the Internet are more open to penetration than those connecting ia dial-up. Answer: !"# $iff: 2 Page !ef: 2%& AA'(: "se of I 'A(#: 'omprehension *+ectie: .1 /) 0ireless networks are ulnera+le to penetration +ecause radio freuency +ands are easy to scan. Answer: !"# $iff: 2 Page !ef: 2% AA'(: "se of I 'A(#: 'omprehension *+ectie: .1 &) he range of 0i-3i networks can +e e4tended up to two miles +y using e4ternal antennae. Answer: 3A5(# $iff: / Page !ef: 2% AA'(: "se of I 'A(#: 'omprehension *+ectie: .1 ) he 0#P specification calls for an access point and its users to share the same &6-+it encrypted password. Answer: !"# $iff: / Page !ef: 2%7 AA'(: "se of I 'A(#: 'omprehension *+ectie: .1
7) 8iruses can +e spread through e-mail. Answer: !"# $iff: 1 Page !ef: 2%7 AA'(: !eflectie hinking 'A(#: 'omprehension *+ectie: .1 9) 'omputer worms spread much more rapidly than computer iruses. Answer: !"# $iff: 2 Page !ef: 2%7 AA'(: !eflectie hinking 'A(#: 'omprehension *+ectie: .1 ) *ne form of spoofing inoles forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: !"# $iff: 2 Page !ef: 2%% AA'(: !eflectie hinking 'A(#: 'omprehension *+ectie: .1 %) (niffers ena+le hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and con fidential reports. Answer: !"# $iff: 2 Page !ef: 2%% AA'(: !eflectie hinking 'A(#: 'omprehension *+ectie: .2 16) $o( attacks are used to destroy information and access restricted areas of a companys information system. Answer: 3A5(# $iff: 2 Page !ef: 2%% AA'(: "se of I 'A(#: 'omprehension *+ectie: .2 11) $o( attacks are one of the most economically damaging kinds k inds of computer crime. Answer: !"# $iff: / Page !ef: /66-/61 AA'(: "se of I 'A(#: 'omprehension *+ectie: .2