How are information systems vulnerable to destruction error and abuse?
Answers
Digital data are vulnerable to destruction, misuse, error, fraud, and hardware or software failures. The Internet is designed to be an open system and makes internal corporate systems more vulnerable to actions from outsiders. Hackers can unleash denial-of-service (DoS) attacks or penetrate corporate networks, causing serious system disruptions. Wi-Fi networks can easily be penetrated by intruders using sniffer programs to obtain an address to access the resources of the network. Computer viruses and worms can disable systems and Web sites. The dispersed nature of cloud computing makes it difficult to track unauthorized activity or to apply controls from afar. Software presents problems because software bugs may be impossible to eliminate and because software vulnerabilities can be exploited by hackers and malicious software. End users often introduce errors.
An information system is vulnerable to destruction
• Information systems are susceptible to destruction, error, and abuse for the reason that of a lot of factors mainly caused by unauthorized users gaining access to company networks.
• On the client (user) level, threats comprise illicit access and errors.
• Digital data are susceptible to destruction, misuse, error, fraud, and hardware or software letdowns