Discussion Post: Business Information System
Why are information systems vulnerable to destruction, error, and abuse? Describe how you would prevent hacking of a system. What do you consider the prime motivation for hacking a system? Research how firms have dealt with their systems being hacked.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.