Management Information Systems: Managing The Digital Firm -- Student Value Edition (16th Edition)
16th Edition
ISBN: 9780135191927
Author: Kenneth Laudon, Jane Laudon
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 8, Problem 9HMP
Explanation of Solution
Total number of vulnerabilities:
- The risk is been analyzed based on computing platform.
- High Risk
- Medium Risk
- Low Risk
- The details of security vulnerabilities are shown below:
PLATFORM |
NUMBER OF COMPUTERS |
HIGH RISK |
MEDIUM RISK |
LOW RISK |
TOTAL VULNERABILITIES |
Windows Vista Ultimate | 3 | 56 | 242 | 87 | 1155 |
Linux | 1 | 3 | 154 | 98 | 255 |
Windows Server | 1 | 11 | 37 | 19 | 67 |
Sun Solaris | 1 | 12 | 299 | 78 | 778 |
Windows vista ultimate desktops and laptops | 195 | 14 | 16 | 1237 | 247065 |
- The total number of vulnerabilities for each platform is indicated in rightmost column of table.
Potential impact of security problems:
The potential impact of security problems is shown below:
- High risk vulnerabilities:
- The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...
Explanation of Solution
Platform to address:
- First platform:
- The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
- The core system operations are affected by task of administrators.
- Second platform:
- The windows server with corporate applications denotes second platform.
- The business conduction may be affected if corporate applications are corrupted.
- Third platform:
- The Sun Solaris with e-commerce and web servers denote third platform.
- The internal operations are ensured to be safe and secure...
Explanation of Solution
Types of control problems:
- The types of control problems includes:
- General controls:
- It governs design, security, and use of computer programs and data file security.
- It is applied to all computerized applications.
- It consists of a combination of software, hardware and manual procedures that creates overall control environment.
- Windows Vista ultimate for high level administrators.
- Sun Solaris for e-commerce and web servers.
- Application controls:
- It denotes specific controls that are unique to each computerized application.
- It includes payroll or order processing.
- It includes both manual as well as automated procedures that ensure authorized data processing.
- It can be classified as input controls, output controls and processing controls...
- General controls:
Explanation of Solution
Risk of ignoring security vulnerabilities:
- The technical, environmental and organizational threats can be faced by the
information systems. - The top priority should be given the system security and it should be ensured by managers at all levels.
- The security awareness should be spread to all employees...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
I need help writing the recursive function called powerlist that computes the power of n (given as a parameter) of the numbers in a list. I need to use map.
An example of what I have to do could be powerlist([6,4,3],5)=[6^5,4^5,3^5].
Can you show me how to redesign the Milwaukee Rep website using HTML and CSS using Sublime Text?
Problem 3
A radar speed gun is a device used in law-enforceme✗measure the speed of moving vehicles in miles
per hour. The measured speeds are supposed to be stored in a file, one number per line, as follows:
65.6
70.2
54.9
Unfortunately, due to an intermittent fault, occasionally multiple numbers are written on a single line as
follows:
73.2 65.6 69.8
Furthermore, occasionally the radar gun outputs a single stray character such as: 67.9z, 6$4.9, or a3.9, to
illustrate just a few.
Given a file that has radar speed gun readings, write a function averageSpeed() to calculate the average of
the numbers in the file. Your code must adhere to the following specifications:
a. Prompt the user for the name of the input file to process. When the user enters a nonexistent file
name, give the user a second chance. After two wrong entries in a row, quit the program with an
appropriate message.
b. Ignore numbers containing stray characters.
Ignore any reading for slow vehicles moving at 2 miles per…
Chapter 8 Solutions
Management Information Systems: Managing The Digital Firm -- Student Value Edition (16th Edition)
Ch. 8.2 - Prob. 1.1CQCh. 8.2 - Prob. 1.2CQCh. 8.2 - Prob. 1.3CQCh. 8.4 - Prob. 2.1CQCh. 8.4 - Prob. 2.2CQCh. 8.4 - Prob. 2.3CQCh. 8.4 - Prob. 2.4CQCh. 8 - Prob. 1IQCh. 8 - Prob. 2IQCh. 8 - Prob. 3IQ
Ch. 8 - Prob. 4IQCh. 8 - Prob. 5IQCh. 8 - Prob. 1RQCh. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8HMPCh. 8 - Prob. 9HMPCh. 8 - Prob. 11HMPCh. 8 - Prob. 12CTPCh. 8 - Prob. 13CSQCh. 8 - Prob. 14CSQCh. 8 - Prob. 15CSQCh. 8 - Prob. 16CSQCh. 8 - Prob. 17MLMCh. 8 - Prob. 18MLM
Knowledge Booster
Similar questions
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education