Management Information Systems: Managing The Digital Firm (16th Edition)
Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 9HMP

Explanation of Solution

 Total number of vulnerabilities:

  • The risk is been analyzed based on computing platform.
    • High Risk
    • Medium Risk
    • Low Risk
  • The details of security vulnerabilities are shown below:
PLATFORM

NUMBER

OF COMPUTERS

HIGH

RISK

MEDIUM

RISK

LOW

RISK

TOTAL

VULNERABILITIES

Windows Vista Ultimate356242871155
Linux1315498255
Windows Server111371967
Sun Solaris11229978778
Windows vista ultimate desktops and laptops19514161237247065
  • The total number of vulnerabilities for each platform is indicated in rightmost column of table.

 Potential impact of security problems:

The potential impact of security problems is shown below:

  • High risk vulnerabilities:
    • The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...

Explanation of Solution

 Platform to address:

  • First platform:
    • The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • The core system operations are affected by task of administrators.
  • Second platform:
    • The windows server with corporate applications denotes second platform.
    • The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • The Sun Solaris with e-commerce and web servers denote third platform.
    • The internal operations are ensured to be safe and secure...

Explanation of Solution

 Types of control problems:

  • The types of control problems includes:
    • General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

 Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by the information systems.
  • The top priority should be given the system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
I need help writing the recursive function called powerlist that computes the power of n (given as a parameter) of the numbers in a list. I need to use map. An example of what I have to do could be powerlist([6,4,3],5)=[6^5,4^5,3^5].
Can you show me how to redesign the Milwaukee Rep website using HTML and CSS using Sublime Text?
Problem 3 A radar speed gun is a device used in law-enforceme✗measure the speed of moving vehicles in miles per hour. The measured speeds are supposed to be stored in a file, one number per line, as follows: 65.6 70.2 54.9 Unfortunately, due to an intermittent fault, occasionally multiple numbers are written on a single line as follows: 73.2 65.6 69.8 Furthermore, occasionally the radar gun outputs a single stray character such as: 67.9z, 6$4.9, or a3.9, to illustrate just a few. Given a file that has radar speed gun readings, write a function averageSpeed() to calculate the average of the numbers in the file. Your code must adhere to the following specifications: a. Prompt the user for the name of the input file to process. When the user enters a nonexistent file name, give the user a second chance. After two wrong entries in a row, quit the program with an appropriate message. b. Ignore numbers containing stray characters. Ignore any reading for slow vehicles moving at 2 miles per…
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education