MBA 650 Chapter 8 & 9 | Page 13

Hackers, Patches, and Reverse Engineering

1. Explain what type of maintenance Microsoft is performing when fixing security holes and releasing patches to its customers.

The type of maintenance being performed is classified security hole patching. They patch the holes with delayed public knowledge to not allow hackers to know there is a security hole to begin with. If a hacker knows this information they can reverse engineer the patch.

2. Are there situations where it is justified for hackers to find and exploit security holes for software? If so or if not, explain.

Yes. Some hackers exploit a security hole not to cause harm, but to show that it can be done. By showing that a security hole can be exploited, the hackers inform Microsoft that this software is vulnerable to someone with ill intent. This is like a warning sign.

Broadcasting

1. What is the effect of the Internet on television and radio content?

With revenues from advertising in traditional channels diminishing,

how can television and radio stations continue

to produce high-quality content?

Television and radio content have become secondary sources of information due to the Internet. Television and radio can adapt and use the internet as part of their content. Television is using the Internet as a source to watch shows. Radio has shifted to satellite radio and podcasts to use the Internet as part of their platform.

2. Today there are thousands of AM/FM stations competing with Internet radio stations and music downloading. Forecast their future and provide a strategy for retaining and gaining market share.

AM/FM stations attract listeners for their local content and specific talk show hosts like Rush Limbaugh. The stations need to utilize the internet in their strategy. The station should have a web site that allows live streaming of the radio station coverage.