Operating System Exposures and Controls Listed here are five scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a. The systems operator opened a bag of burned microwave popcorn directly under a smoke detector in the computing room where two mainframes, three highspeed printers, and approximately 40 tapes are housed. The extremely sensitive smoke detector triggered the sprinkler system. Three minutes passed before the sprinklers could be turned off. b. A system programmer intentionally placed an error into a program that causes the operating system to fail and dump certain confidential information to disks and printers. c. Jane’s employer told her she would be laid off in 3 weeks. After 2 weeks, Jane realized that finding another secretarial job was going to be very tough. She became bitter. Her son told her about a virus that had infected his school’s computers and that one of his disks had been infected. Jane took the infected disk to work and copied it onto the network server, which is connected to the company’s mainframe. One month later, the company realized that some data and application programs had been destroyed.
Listed here are five scenarios. For each scenario, discuss
the potential consequences and give a prevention
technique.
a. The systems operator opened a bag of burned microwave popcorn directly under a smoke detector in the
computing room where two mainframes, three highspeed printers, and approximately 40 tapes are
housed. The extremely sensitive smoke detector triggered the sprinkler system. Three minutes passed before the sprinklers could be turned off.
b. A system programmer intentionally placed an error
into a program that causes the operating system to
fail and dump certain confidential information to
disks and printers.
c. Jane’s employer told her she would be laid off in 3 weeks.
After 2 weeks, Jane realized that finding another secretarial job was going to be very tough. She became bitter.
Her son told her about a virus that had infected his
school’s computers and that one of his disks had been
infected. Jane took the infected disk to work and copied
it onto the network server, which is connected to the
company’s mainframe. One month later, the company
realized that some data and application programs had
been destroyed.
d. Robert discovered a new sensitivity analysis publicdomain program on the Internet. He downloaded
the software to his microcomputer at home, then took the application to work and placed it onto his
networked personal computer. The program had a
virus on it that eventually spread to the company’s
mainframe.
e. Murray, a trusted employee and a systems engineer,
had access to both the computer access control list
and user passwords. The firm’s competitor recently
hired him for twice his salary. After leaving, Murray
continued to browse through his old employer’s data,
such as price lists, customer lists, bids on jobs, and so
on. He passed this information on to his new
employer
Trending now
This is a popular solution!
Step by step
Solved in 4 steps