Describe the ways in which businesses protect themselves from the threats and risks information technology poses
What will be an ideal response?
Answer: Most systems guard against unauthorized access by requiring users to have protected passwords. In addition, many firms rely on safeguards, such as firewalls, so that only messages that meet the conditions of the company's security policy are permitted to flow in or out of the network. Firms can protect against identity theft by using assistance from advisory sources such as the Identity Theft Resource Center and by implementing the identify-theft protection provisions of the federal FACTA rule for maintaining and destroying personal information records. To combat viruses, worms, and Trojan horses, anti-virus software products search incoming e-mails and data files for "signatures" of known viruses and virus-like characteristics. Contaminated files are discarded or placed in quarantine for safekeeping. Additional intrusion protection is available by installing anti-spyware and spam filtering software, and from lawsuits against spammers.
You might also like to view...
A one-sign-reversal project should be accepted if it
A) produces an internal rate of return that is greater than the firm's discount rate. B) results in a modified internal rate of return that is higher than the internal rate of return. C) generates an internal rate of return that is higher than the profitability index. D) results in an internal rate of return that is above a project's equivalent annual annuity.
The vast majority of labor agreements provide overtime rates of exactly 2 times the regular rate of pay
Indicate whether the statement is true or false