MIS 3534 – Prof. Min-Seok Pang

Online discussion questions – Apr 1

  • How would you explain the difference between a distributed denial of service (DDoS) attack and an intrusion to a non-IT boss or colleagues?
  • If an intrusion was indeed occurred and it was the intruder who changed the database index file, why would he/she have done it?
  • What would have happened if Mr. Barton “pulled the plug” at the request of Mr. Wells?
  • How would you explain “set up parallel systems built from development files, then switch over the those” to your non-IT boss?

10 Responses to Online discussion questions – Apr 1

Leave a Reply