Question

In protecting systems, is the major component of information Systems that must be watched carefully. Hardware Software Networ

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 26 :-   Option 3 ( Network )

Explaination :- While protecting the system from security attacks , the most vulnerable component of the Information System is the Network as it is the only gateway that is connected to the other systems via internet or othr network. Thus it is possible could attack the system via the network if the network is not very secured.There are a lot of attacks that are done via network only i.e Denial of service attack , unauthorised access , traffic attack etc . Thus in protecting system , Network is the major component of the information system that is to be watched very carefully.

Answer 28 :-- Option 4 (pilot conversion by implementing prototype and releasing final version later)

Explaination :- When a company implements a developed application , it might be possible that the developed application might get some problem with the user or if it is implemented directly then it would be problem as the old system will be unused immediatly. So pilot conversio is the best option. In Pilot conversion , the smaller version or the beta version of the developed application is given to a small group of people and their experience with the application are monitered . Then based on the feedback of the beta version users , the final version is released , which can be used by all.

Add a comment
Know the answer?
Add Answer to:
In protecting systems, is the major component of information Systems that must be watched carefully. Hardware...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT