To complete this assignment successfully, you should:
1. What poses the greatest threat to maintaining the integrity of an information system?
2. Identify the various ways of accessing an information system without authorization.
3. Identify four computer security measures.
4. What is software piracy?
5. Why should regular equipment inventories be conducted?
6. Describe a good password.
7. What should an operation do to protect its information system from a virus?
For grading purposes, please provide the following information:
Once you have filled in the areas above, click the Send button below to send your response to the instructor.
Send E-mail to Galen Collins or call (928) 523-7333
Copyright 1999 Northern Arizona University ALL RIGHTS RESERVED