You are on page 1of 2

Why has the theft of computing devices become more

serious over time?

processes involved in the systems development life


cycle.

What are the three types of software attacks?

Discuss the concerns and risks associated with cloud


computing.

Define alien software, and explain why it is a serious


problem

Identify the key benefits of cloud computing .

What is a SCADA system?

List Global challenges in information systems

Describe several reasons why it is difficult to protect


information resources.

Why has the theft of computing devices become more


serious over time?

Compare and contrast risk management and risk


analysis

What are the three types of software attacks?

Differentiate between authentication and


authorization. Which of these processes is performed
first?
Identify the five factors that contribute to the
increasing vulnerability of information resources, and
provide a specific example of each one.
Compare and contrast human mistakes and social
engineering, and
provide a specific example of each one.
Discuss ways in which information technology can
affect managers
and non-managerial workers.
List positive and negative societal effects of the
increased use of information technology.
Define Big Data, and discuss its basic characteristics.
Identify advantages and drawbacks to businesses of
implementing an ERP system.
Enumerate the primary tasks and importance of each
of the six

Define alien software, and explain why it is a serious


problem
What is a SCADA system?
Describe several reasons why it is difficult to protect
information resources.
Compare and contrast risk management and risk
analysis
Differentiate between authentication and
authorization. Which of these processes is performed
first?
Identify the five factors that contribute to the
increasing vulnerability of information resources, and
provide a specific example of each one.
Compare and contrast human mistakes and social
engineering, and
provide a specific example of each one.
Discuss ways in which information technology can
affect managers
and non-managerial workers.

List positive and negative societal effects of the


increased use of information technology.
Define Big Data, and discuss its basic characteristics.
Identify advantages and drawbacks to businesses of
implementing an ERP system.
Enumerate the primary tasks and importance of each
of the six

processes involved in the systems development life


cycle.
Discuss the concerns and risks associated with cloud
computing.

Identify the key benefits of cloud computing .


List Global challenges in information systems

You might also like