MANAGEMENT INFORMATION SYSTEMS
MANAGEMENT INFORMATION SYSTEMS
15th Edition
ISBN: 9780134640037
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 9HMP

Explanation of Solution

 Total number of vulnerabilities:

  • The risk is been analyzed based on computing platform.
    • High Risk
    • Medium Risk
    • Low Risk
  • The details of security vulnerabilities are shown below:
PLATFORM

NUMBER

OF COMPUTERS

HIGH

RISK

MEDIUM

RISK

LOW

RISK

TOTAL

VULNERABILITIES

Windows Vista Ultimate356242871155
Linux1315498255
Windows Server111371967
Sun Solaris11229978778
Windows vista ultimate desktops and laptops19514161237247065
  • The total number of vulnerabilities for each platform is indicated in rightmost column of table.

 Potential impact of security problems:

The potential impact of security problems is shown below:

  • High risk vulnerabilities:
    • The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...

Explanation of Solution

 Platform to address:

  • First platform:
    • The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • The core system operations are affected by task of administrators.
  • Second platform:
    • The windows server with corporate applications denotes second platform.
    • The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • The Sun Solaris with e-commerce and web servers denote third platform.
    • The internal operations are ensured to be safe and secure...

Explanation of Solution

 Types of control problems:

  • The types of control problems includes:
    • General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

 Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by the information systems.
  • The top priority should be given the system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
I need help in construct a matlab code to find the voltage, the currents, and the watts based on that circuit.
Objective Implement Bottom-Up Iterative MergeSort and analyze its efficiency compared to recursive MergeSort. Unlike the recursive approach, which involves multiple function calls and stack overhead, the bottom-up version sorts iteratively by merging small subarrays first, reducing recursion depth and improving performance. Task 1. Implement Bottom-Up Iterative MergeSort о Start with single-element subarrays and iteratively merge them into larger sorted sections. Use a loop-based merging process instead of recursion. ○ Implement an efficient in-place merging strategy if possible. 2. Performance Analysis Compare execution time with recursive MergeSort on random, nearly sorted, and reversed datasets. ○ Measure and plot time complexity vs. input size. O Submission Explain why the iterative version reduces function call overhead and when it performs better. • Code implementation with comments. • A short report (1-2 pages) comparing performance. • Graph of execution time vs. input size for…
Given a shared data set, we allow multiple readers to read at the same time, and only one single writer can access the shared data at the same time. In the lecture slides, a solution is given. However, the problem is that the write cannot write forever, if there are always at least one reader. How to ensure that the writer can eventually write? Propose your solution by using semaphores and implemented in Python from threading import Thread, Semaphore from time import sleep from sys import stdout class Reader(Thread): def__init__(self, name): self.n=name; Thread.__init__(self) defrun(self): globalnr, nw, dr, dw whileTrue: # ⟨await nw == 0 then nr += 1⟩ e.acquire() ifnw>0: #if nw > 0 or dw > 0 : dr+=1; e.release(); r.acquire() nr+=1 ifdr>0: dr-=1; r.release() else: e.release() # read data stdout.write(self.n+' reading\n') sleep(1) # ⟨nr -= 1⟩ e.acquire() nr-=1 ifnr==0anddw>0: dw-=1 ; w.release() else: e.release() class Writer(Thread): def__init__(self, name):…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education