(TCO A) List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised. (A description of damage, not a definition of data integrity, is required.) (Points : 40)
(TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also, suppose you do not use the full capacity of your network connection. List and assess four reasons why you might still want to prevent an outsider obtaining free network access by intruding into your wireless network?
(TCO C) You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal. (Points : 40)
(TCO D) Give 3 examples of how a person could unknowingly or unintentionally participate in a criminal act through their computer system?
(TCO E) Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second four policies can’t be enforced using technology and how managers could attempt to assure compliance. (Points : 40)
(TCO F) Discuss four ways in which ethics are different from laws. (Points : 40)
(TCO H) Some IT department policies are designed to prevent behaviors by IT staff. While some depend upon the employee voluntarily complying with the policy (for example: do not reveal technical information to outside parties), others are enforced technically (for example, authentication required for system access). What is an example of a policy that technically enforces ethical behavior by IT staff? Provide policy wording for your example. (Points : 40)
Hi there! Get instant help with.Without paying anything upfront.