
Explanation of Solution
System security is to prevent information from unauthorized access. The goals of information systems are to prevent from information violations, identification of the attacks, and response for developing strategies.
Threat:
A threat is a thing that can cause damage to the organization, IT systems or other networks.
Vulnerability:
It is a path for threats to attack a system. It is a way to increase the availability of accessing individual or organizational assets.
Safeguard:
It is a measurement by an individual or organization to protect occurrence of threats. “Encryption” is a method which acts as a safeguard that encrypt the information of the company so that others can’t access the data.
Target:
Target is the output of threats which can be in the form of assets, bank accounts and statements.
Example:
If the user wants to transact amount through online, he/she must provide the bank details like account number and password over the web to access an account.
Threat in above example: The details of an account may be accessed by any intruder without user’s knowledge which leads to loss of information is one of the threats.
Vulnerability in above example: The same example that was mentioned on “threat”, the vulnerable point is the internet point used to access the user information.
Safeguard in above example: Safeguard is a protection shield that hides the user data from illegal access from threats.
Target in above example: The target of the above example is login the bank account by the intruder without user’s permission.
Types of threats:
There are three types of threats in system security. They are as follows:
- Human error
- Computer crime
- Natural disasters
Human error:
Human error is an error which is caused by a single person like employees or customers. For example, if an employee can accidentally removes or edits customer details.
Computer crime:
It is an illegal access by the hacker via internet or web. This crime can install viruses on computers to corrupt systems and hack information.
Natural disasters:
This threat caused due to natural disasters like accidents, floods or earthquakes. It may cause loss of capability and services.
Types of security losses:
There are five types of security losses in system security are as follows:
- Unauthorized data disclosure
- Incorrect data modification
- Faulty service
- Denial of service(DOS)
- Loss of infrastructure
Unauthorized data disclosure: The data disclosure is nothing but data was accessed by unauthorized people may result in loss of information. It might occur accidentally or intentionally.
Incorrect data modification: If the data has been modified incorrectly then the data loss occurred in any organization is termed as incorrect data modification...

Want to see the full answer?
Check out a sample textbook solution
Chapter 10 Solutions
Using MIS (9th Edition)
- how to read log logsarrow_forwardDiscrete Mathematics for Computer Engineeringarrow_forwardQuestion 1 - Array Iterators Like the JS on A2, there is no visual component to this question. The HTML really just needs to load the JavaScript, everything else will output to the console. The JS file should the completion of the task, and all necessary testing, so that just loading the file will complete the task with enough different inputs to ensure it works. Even Numbers [3 marks] Create a function that determines if a provided number is even. Define an array of numbers, then on the array use the appropriate array iterator to determine if the array contains only even numbers using the function you defined. Output the results, and test with several arrays. Long Names [3 marks] Define an array of names. Use an iterator to retrieve a new array containing only the names longer then 12 characters. Your iterator should be passed an anonymous arrow function. Test with several different arrays First Names [3 marks] Define an array called fullNames that contains 7 javascript objects of…arrow_forward
- Discrete Mathematics for Computer Engineeringarrow_forwardthis module is java 731 . make sure my answers are 1005 correct and the layout and structure is perfect and also include all comments etc. thank you i have attached question 1 (40 marks) and question 2 (30 marks ) this is question 3: Question3: (30 MARKS) Passenger Rail Agency for South Africa Train Scheduling System Problem Statement Design and implement a train scheduling system for Prasa railway network. The system should handle the following functionalities: 1. Scheduling trains: Allow the addition of train schedules, ensuring that no two trains use the same platform at the same time at any station. 2. Dynamic updates: Enable adding new train schedules and canceling existing ones. 3. Real-time simulation: Use multithreading to simulate the operation of trains (e.g., arriving, departing). 4. Data management: Use ArrayList to manage train schedules and…arrow_forwardthis module is java 731 . make sure my answers are 1005 correct and the layout and structure is perfect and also include all comments etc. thank you i have attached question 1 (40 marks) and question 2 (30 marks ) this is question 3: Question3: (30 MARKS) Passenger Rail Agency for South Africa Train Scheduling System Problem Statement Design and implement a train scheduling system for Prasa railway network. The system should handle the following functionalities: 1. Scheduling trains: Allow the addition of train schedules, ensuring that no two trains use the same platform at the same time at any station. 2. Dynamic updates: Enable adding new train schedules and canceling existing ones. 3. Real-time simulation: Use multithreading to simulate the operation of trains (e.g., arriving, departing). 4. Data management: Use ArrayList to manage train schedules and…arrow_forward
- this module is java 731 . make sure my answers are 1005 correct and the layout and structure is perfect and also include all comments etc. thank you i have attached question 1 (40 marks) and question 2 (30 marks ) this is question 3: Question3: (30 MARKS) Passenger Rail Agency for South Africa Train Scheduling System Problem Statement Design and implement a train scheduling system for Prasa railway network. The system should handle the following functionalities: 1. Scheduling trains: Allow the addition of train schedules, ensuring that no two trains use the same platform at the same time at any station. 2. Dynamic updates: Enable adding new train schedules and canceling existing ones. 3. Real-time simulation: Use multithreading to simulate the operation of trains (e.g., arriving, departing). 4. Data management: Use ArrayList to manage train schedules and…arrow_forwardDiscrete Mathematics for Computer Engineeringarrow_forwardTask 1: Write an abstract class Method +: public -: private #: protected Underline: static # input: int # output:String Method + isHard():boolean + specificWay():String + Method() + Method(input: int, output: String) + getInput(): int + setInput(input: int): void + getOutput(): String + setOutput(output: String): void +toString(): String Question Task 2: Write a class ReadMethod that extends the Method class. +: public -: private #: protected Underline: static -language: String ReadMethod Question + ReadMethod() + ReadMethod(input: int, output: String, language: String) + isHard():boolean + specific Way(): String +toString(): String + getLanguage(): String + setLanguage(language: String): voidarrow_forward
- i have attatched my java question , please make sure it is answered correct, include all comments etc, thank youarrow_forwardi have attached my 2 java questions . please answer them correctly, add all comments etc . thank you.arrow_forwardCan you help me solve this problem using Master's Theorem:Solve the recurrence relation f(n) = 3af(n/a) + (n + a)2 with f(1) = 1 and a > 1 byfinding an expression for f(n) in big-Oh notation.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





