a) Identify the procedures that could be adopted to control the spread of computer viruses in an organisation. b) Name six threats to an organization’s information system...

      

a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system that could arise as a result of
computer crime.

  

Answers


Kavungya
a) Controlling the spread of computer viruses
- Ensure you have an update ant-virus software and scanning definitions frequently
- Allow no disk to be used until it has been scanned on a stand-alone machine that is used
for no other purpose and is not connected to the network.
- Ensure that the network administrator uses workstation and server anti-virus software
•Insist that field technicians scan their disks bn a test machine before they use any of their
disks on the system
- Enforce a rule of not using shareware without first scanning the shareware thoroughly for
a virus '
- Build any system from original, clean master copies. Boot only from original diskettes
whose write protection has always been in place.
- Write-protect all diskettes with EXE or COM extensions

b) Threats due to computer crime
- Sabotage - some perpetrators are not looking for financial gain. They merely want to
cause damage due to dislike of the organization or for self-gratification
- Financial loss - these losses can be direct, through loss of electronic funds or indirect,
through the costs of correcting the exposure.
- Legal repercussions - Not having proper security measures could expose the
organization to lawsuits from investors and insurers if a significant loss occurs from a security violation. Most companies also must comply with industry-specific regulatory
agencies.
- Loss of credibility or competitive edge - many organizations, especially service firms
such as . banks, savings and loans and investment firms, need credibility and public
trust to maintain a competitive edge. A security violation can severely damage this
credibility, resulting in loss of business and prestige.
- Blackmail/Industrial espionage - by gaining access to confidential information, a
perpetrator can extort payments or services from an organization by threatening to
exploit the security breach.
Kavungya answered the question on May 14, 2019 at 08:16


Next: Identify three vital services which information systems can provide to a business organization.
Previous: Differentiate between information systems (IS) and information technology (IT).

View More ATD Information Communication Technology Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions