Explain the defense strategies implemented for computer crimes.

      

Explain the defense strategies implemented for computer crimes.

  

Answers


Kavungya
- Controls for prevention and difference – This is aimed at preventing errors from occurring, to deter criminals from attacking and to deny access to unauthorized people. This is important where potential damage to the information system is very high.
- Detection – It may not be possible to prevent all hazards therefore deterring measures may not work therefore unprotected systems are vulnerable to attach hence if the attack can be detected as early as possible it will be possible to combat it before it causes damage e.g. one may not protect or prevent fire from occurring or a virus from attacking but if either of this is detected early enough the damage can be minimal
- Imitation – This means minimizing losses once a malfunction has occurred. It can be accomplished by including a fault tolerant system that permits operation in a degraded mode until full recovery is made
- Recovery – This defense strategy explains how to fix a damaged information system as quickly as possible. It involves replacing of components that have been affected in order to recover as fast as possible.
- Correction – This strategy focuses on the repairing of the damaged components and also preventing the problem for occurring again.
Kavungya answered the question on May 10, 2019 at 13:10


Next: a) Find a bilinear transformation, which transforms the unit circle |z| = 1 into the real axis of the w plane in such a way that...
Previous: Describe the general computer controls.

View More Management Information Systems Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions