Fundamentals of Information Systems (Looseleaf)
Fundamentals of Information Systems (Looseleaf)
9th Edition
ISBN: 9781337099042
Author: STAIR
Publisher: Cengage
Question
Book Icon
Chapter 8, Problem 10RQ
Program Plan Intro

To explain business continuity plan and disaster recovery plan.

Blurred answer
Students have asked these similar questions
The next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 d1 fe ff ff 40053f: 48 83 c4 18 add callq 400410 $0x18,%rsp 400543: c3 retq 0000000000400544 : 400544: 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: • strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. You will need to know the hex values of the following characters:
A ROP (Return-Oriented Programming) attack can be used to execute arbitrary instructions by chaining together small pieces of code called "gadgets." Your goal is to create a stack layout for a ROP attack that calls a function located at '0x4018bd3'. Below is the assembly code for the function 'getbuf', which allocates 8 bytes of stack space for a 'char' array. This array is then passed to the 'gets' function. Additionally, you are provided with five useful gadgets and their addresses. Use these gadgets to construct the stack layout. Assembly for getbuf 1 getbuf: 2 sub $8, %rsp 3 mov %rsp, %rdi 4 call gets 56 add $8, %rsp ret #Allocate 8 bytes for buffer #Load buffer address into %rdi #Call gets with buffer #Restore the stack pointer #Return to caller. Stack Layout (fill in Gadgets each 8-byte section) Address Gadget Address Value (8 bytes) 0x4006a7 pop %rdi; ret 0x7fffffffdfc0 Ox4006a9 pop %rsi; ret 0x7fffffffdfb8 0x4006ab pop %rax; ret 0x7fffffffdfb0 0x7fffffffdfa8 Ox4006ad mov %rax,…
In each of the following C code snippets, there are issues that can prevent the compilerfrom applying certain optimizations. For each snippet:• Circle the line number that contains compiler optimization blocker.• Select the best modification to improve optimization.1. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Remove printf or move it outside the loop.• Remove the loop.• Replace arr[i] with a constant value.1 int sum( int ∗ ar r , int n) {2 int s = 0 ;3 for ( int i = 0 ; i < n ; i++) {4 s += a r r [ i ] ;5 p r i n t f ( ”%d\n” , s ) ;6 }7 return s ;8 }2. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Move or eliminate do extra work() if it’s not necessary inside the loop.• Remove the loop (but what about scaling?).• Replace arr[i] *= factor; with arr[i] = 0; (why would that help?).1 void s c a l e ( int ∗ ar r , int n , int f a c t o r ) {2 for ( int i = 0 ; i < n ; i++) {3 a r r [ i ] ∗= f a c t o r…

Chapter 8 Solutions

Fundamentals of Information Systems (Looseleaf)

Ch. 8 - Prob. 11LOCh. 8 - Prob. 12LOCh. 8 - Identify the key factors to be considered in...Ch. 8 - Prob. 1.1RQCh. 8 - Prob. 1.2RQCh. 8 - How would you go about selecting and recruiting...Ch. 8 - What do you think might be the biggest harriers to...Ch. 8 - Prob. 2.1RQCh. 8 - Following your discussion, one of the team members...Ch. 8 - There is likely to be some confusion over the role...Ch. 8 - What other potential problems can you anticipate...Ch. 8 - Prob. 3.1RQCh. 8 - Prob. 3.2RQCh. 8 - Prob. 3.1CTQCh. 8 - A safety-critical system is one whose failure or...Ch. 8 - Prob. 1SATCh. 8 - Prob. 2SATCh. 8 - Prob. 3SATCh. 8 - Prob. 4SATCh. 8 - The purpose of the system investigation phase is...Ch. 8 - Prob. 6SATCh. 8 - The overall emphasis of the ___________ phase is...Ch. 8 - The primary tool for assessing the software...Ch. 8 - Prob. 9SATCh. 8 - Prob. 10SATCh. 8 - Prob. 11SATCh. 8 - Prob. 12SATCh. 8 - A preliminary evaluation of software packages and...Ch. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - What are the key elements of a system...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQCh. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - Prob. 14RQCh. 8 - An organization has selected and is now...Ch. 8 - Prob. 1DQCh. 8 - Thoroughly discuss the pros and cons of buying...Ch. 8 - Prob. 3DQCh. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - You have been assigned to write a newspaper report...Ch. 8 - Prob. 7DQCh. 8 - Define the Pareto principle, and discuss how it...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Identify and briefly discuss four key tasks...Ch. 8 - Prob. 1PSECh. 8 - Prob. 2PSECh. 8 - A new sales ordering system needs a relational...Ch. 8 - Prob. 1WECh. 8 - Prob. 2WECh. 8 - Do research to determine the current level of...Ch. 8 - Prob. 1CECh. 8 - Perform research to learn what is required to have...Ch. 8 - Identify an information system frequently employed...Ch. 8 - It is perhaps not surprising that Etsy was an...Ch. 8 - Prob. 1.2CSCh. 8 - What would be some of the criteria you would use...Ch. 8 - Prob. 2.1CSCh. 8 - Prob. 2.2CSCh. 8 - Prob. 2.3CS
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning