Management Information Systems: Managing The Digital Firm (16th Edition)
Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 9HMP

Explanation of Solution

 Total number of vulnerabilities:

  • The risk is been analyzed based on computing platform.
    • High Risk
    • Medium Risk
    • Low Risk
  • The details of security vulnerabilities are shown below:
PLATFORM

NUMBER

OF COMPUTERS

HIGH

RISK

MEDIUM

RISK

LOW

RISK

TOTAL

VULNERABILITIES

Windows Vista Ultimate356242871155
Linux1315498255
Windows Server111371967
Sun Solaris11229978778
Windows vista ultimate desktops and laptops19514161237247065
  • The total number of vulnerabilities for each platform is indicated in rightmost column of table.

 Potential impact of security problems:

The potential impact of security problems is shown below:

  • High risk vulnerabilities:
    • The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...

Explanation of Solution

 Platform to address:

  • First platform:
    • The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • The core system operations are affected by task of administrators.
  • Second platform:
    • The windows server with corporate applications denotes second platform.
    • The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • The Sun Solaris with e-commerce and web servers denote third platform.
    • The internal operations are ensured to be safe and secure...

Explanation of Solution

 Types of control problems:

  • The types of control problems includes:
    • General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

 Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by the information systems.
  • The top priority should be given the system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
1. Complete the routing table for R2 as per the table shown below when implementing RIP routing Protocol? (14 marks) 195.2.4.0 130.10.0.0 195.2.4.1 m1 130.10.0.2 mo R2 R3 130.10.0.1 195.2.5.1 195.2.5.0 195.2.5.2 195.2.6.1 195.2.6.0 m2 130.11.0.0 130.11.0.2 205.5.5.0 205.5.5.1 R4 130.11.0.1 205.5.6.1 205.5.6.0
Analyze the charts and introduce each charts by describing each. Identify the patterns in the given data. And determine how are the data points are related.   Refer to the raw data (table):
3A) Generate a hash table for the following values: 11, 9, 6, 28, 19, 46, 34, 14. Assume the table size is 9 and the primary hash function is h(k) = k % 9. i) Hash table using quadratic probing ii) Hash table with a secondary hash function of h2(k) = 7- (k%7) 3B) Demonstrate with a suitable example, any three possible ways to remove the keys and yet maintaining the properties of a B-Tree. 3C) Differentiate between Greedy and Dynamic Programming.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education