Week 1 Answer :
It is important to understand human beings and technology interact in all information systems. This is important because when humans understand their interaction with technology, they will embrace its importance and help in managing and controlling their use(Mjolsnes, 2011). In addition to that, this knowledge helps humans to come up with innovative means to make sure that their interaction with technology is profitable to them.
It is important and necessary for businesses to educate their employees on security matters. This is because when employees understand the security of systems, they will avoid behaviors that might risk the safety of their systems (Seigneur, 2009). They will avoid sharing passwords of the systems to unauthorized people.
References
Mjolsnes, S. F. (2011). A Multidisciplinary Introduction to Information Security. Boca Raton, FL: CRC Press.
Seigneur, J. (2009). Collaborative Computer Security and Trust Management. IGI Global.
Week 2 answer :
Just give me 4 sentences. Not able to find prev. answer.
Week 3 Answer :
A secure system needs a good and effective antivirus program. Some antivirus is free so you do not need any cash to get the protection. The antivirus programs are active each moment on your computer to protect your files and your personal information is always private and confidential. It also helps in the scanning of documents. It is also not a must you log in to windows for you to install the antivirus tool you can use a computer that is functioning and use the antivirus tool that is free to boot and then run on the computer that is infected. An antivirus program with the scanning option is very good, very important and very secure to your computer because the scanning option helps identify a problem or a virus and stops it before it erodes the computer. There are different types of free antivirus programs: Some includes Aviva’s free software, Smadav free software, Avast free software, and Bit defender free software Antivirus (Ariwa & El-Qawasmeh, 2011).
The antivirus known as Bit defender provides protection to your computer instantly against threats, worms, and virus among others. It protects against anti-fraud and this helps to provide security to your computer when using the internet to browse and also during setting the computer. Bit defender antivirus can perform many functions at the same time. These functions include raging files and folders directly into the program, Scan those programs (Studio, 2018).
In conclusion, the antivirus program helps to scan existing files in the programs, email database, files that are achieved, files that are executable, sectors that are bootable. It also helps in identifying files that are bootable (Naumann, 2012). It also helps in identifying files that have viruses. It is advisable to scan and update your computer scanning software on a daily basis or once it expires to ensure the protection of your computer. To ensure that your ...
On National Teacher Day, meet the 2024-25 Kenan Fellows
Week 1 Answer It is important to understand human beings and t.docx
1. Week 1 Answer :
It is important to understand human beings and technology
interact in all information systems. This is important because
when humans understand their interaction with technology, they
will embrace its importance and help in managing and
controlling their use(Mjolsnes, 2011). In addition to that, this
knowledge helps humans to come up with innovative means to
make sure that their interaction with technology is profitable to
them.
It is important and necessary for businesses to educate their
employees on security matters. This is because when employees
understand the security of systems, they will avoid behaviors
that might risk the safety of their
systems (Seigneur, 2009). They will avoid sharing passwords of
the systems to unauthorized people.
References
Mjolsnes, S. F. (2011). A Multidisciplinary Introduction to
Information Security. Boca Raton, FL: CRC Press.
Seigneur, J. (2009). Collaborative Computer Security and Trust
Management. IGI Global.
Week 2 answer :
Just give me 4 sentences. Not able to find prev. answer.
Week 3 Answer :
A secure system needs a good and effective antivirus program.
Some antivirus is free so you do not need any cash to get the
protection. The antivirus programs are active each moment on
2. your computer to protect your files and your personal
information is always private and confidential. It also helps in
the scanning of documents. It is also not a must you log in to
windows for you to install the antivirus tool you can use a
computer that is functioning and use the antivirus tool that is
free to boot and then run on the computer that is infected. An
antivirus program with the scanning option is very good, very
important and very secure to your computer because the
scanning option helps identify a problem or a virus and stops it
before it erodes the computer. There are different types of free
antivirus programs: Some includes Aviva’s free software,
Smadav free software, Avast free software, and Bit defender
free software Antivirus (Ariwa & El-Qawasmeh, 2011).
The antivirus known as Bit defender provides protection to
your computer instantly against threats, worms, and virus
among others. It protects against anti-fraud and this helps to
provide security to your computer when using the internet to
browse and also during setting the computer. Bit defender
antivirus can perform many functions at the same time. These
functions include raging files and folders directly into the
program, Scan those programs (Studio, 2018).
In conclusion, the antivirus program helps to scan existing
files in the programs, email database, files that are achieved,
files that are executable, sectors that are bootable. It also helps
in identifying files that are bootable (Naumann, 2012). It also
helps in identifying files that have viruses. It is advisable to
scan and update your computer scanning software on a daily
basis or once it expires to ensure the protection of your
computer. To ensure that your computer is safe you must use
passwords, install an antivirus program that will help scan
programs and viruses in your computer.
References
Ariwa, E., & El-Qawasmeh, E. (2011). Digital Enterprise and
Information Systems: International Conference, DEIS 2011,
3. London, UK July 20 - 22, 2011, Proceedings. Basingstoke,
England: Springer.
Naumann, U. (2012). The Art of Differentiating Computer
Programs: An Introduction to Algorithmic Differentiation.
Philadelphia, PA: SIAM.
Studio, C. J. (2018). Free Antivirus And Antimalware Software
For Ubuntu & Linux Mint. Cyber Jannah Studio Publishing
Week 4 Answer :
The most compelling reason to migrate information to the cloud
Migrating information to that cloud has a lot of benefits
which make the process an ideal strategy for data management.
The first benefit of cloud computing is that it reduces
information system costs (Ahson & Ilyas, 2010). It minimizes
the cost that companies will incur to manage and maintain their
information technology system. The operating costs which are
reduced include the energy consumption, time used to access the
systems as well as the time needed to upgrade
system (Newcombe, 2012).
Security Concern of Migrating Information to the Cloud
The biggest security concern of migrating information to the
cloud includes the risk of being hacked and data stolen. This
has been a very serious thing that has been affecting cloud
services. In addition to that, there are high chances of the data
in the cloud to be attacked by viruses and malware (Noor, Sheng
& Bouguettaya, 2014).
References
Ahson, S. A., & Ilyas, M. (2010). Cloud Computing and
Software Services: Theory and Techniques. Boca Raton, FL:
CRC Press.
4. Newcombe, L. (2012). Securing Cloud Services: A pragmatic
approach to security architecture in the Cloud. IT Governance
Publishing.
Noor, T. H., Sheng, Q. Z., & Bouguettaya, A. (2014). Trust
Management in Cloud Services. Basingstoke, England:
Springer.
Week 5 Answer :
Cloud Computing
Cloud computing is very ideal in reducing the cost of
computing and as well enhances green computing. This is true
by the fact that cloud computing ensures that computers or other
digital devices are connected in a single
service (Srinivasan, 2014). This means that minimal resources
are used unlike when the computers were individually corrected
to their system. In addition to that, cloud computing reduces the
cost of managing the network since this can be done at a single
point without requiring a very big workforce to manage
it(Rao, 2015). In addition to that, cloud computing provides a
very important platform where computing services can be
properly secured against various cyber-attacks.
References
RAO, M. (2015). CLOUD COMPUTING. New Delhi, Delhi:
PHI Learning Pvt.
Srinivasan, S. (2014). Cloud Computing Basics. Basingstoke,
England: Springer.
Week 6 :
In the banking sector, the financial information system is the
most important system and is the mission-critical system. Banks
mostly deals with finances and therefore having an ideal
financial information system is a mandatory aspect. The system
is very important in providing data to day financial activities in
the bank. The system also holds very sensitive and confidential
data of the banks such as customers’ information and its
5. profitability information (Yap, 2011).
In case the system breaks down or gets lost, there are great
effects that can be experienced in the bank. It might loss
confidential financial data and even lost a lot of money. It can
also affect the clients whose data can be lost thus risking their
financial wellbeing (Wilson & Goddard, 2016).
References
Wilson, J. O., & Goddard, J. (2016). Banking: a Very Short
Introduction. Oxford University Press.
Yap, A. (2011). Information Systems for Global Financial
Markets: Emerging Developments and Effects: Emerging
Developments and Effects. IGI Global.
WEEK 7 :
Just give me 4 sentences. Not able to find prev. answer.
WEEK 8
Just give me 4 sentences. Not able to find prev. answer.