Management Information System
Management Information System
Some common types of malware or malicious software include the software used to hack online accounts of people when making payments online. These malware programs create invisible transactions both to the user and the bank; therefore, end up not being noticed at the time. The use of such malware best describes the man-in-the-middle attack. This means that the software acts as the man in the middle as it is in a position to change the details in both sides.
Authentication factors include human factors, personal factors and technical factors. I have experienced the human, personal and the technical factors when using my credit card in automatic teller machines and paying bills in the stores.
The ZTIC device may malfunction while it is in use thereby causing problems to the user. This means that the device cannot always be trusted as electrical devices are prone to malfunction at any period of time.
Malicious hackers may create an upgraded malware that may in the end cheat the ZTIC device. As we all know, technology is always advances; this means that hackers will find ways of creating malware programs that in the end will be in a position to cheat the ZTIC device hence making it useless, just like other authenticating devices.
In the future, it is expected that malware will increase. This is due to the fact that technology is constantly improving and the hackers are not being left behind. Threats will increase majorly in the internet and the cost of security will definitely go up as the demand for internet security will be higher.
References
IBM Zone Trusted Information Channel (ZTIC). (n.d.). Retrieved from https://www.youtube.com/watch?v=mPZrkeHMDJ8
Laudon, K. C., & Laudon, J. (2013). Management Information System (13th ed.). Pearson.