EBK MANAGEMENT INFORMATION SYSTEMS
EBK MANAGEMENT INFORMATION SYSTEMS
16th Edition
ISBN: 9780135192047
Author: LAUDON
Publisher: VST
Expert Solution & Answer
Book Icon
Chapter 8, Problem 9HMP

Explanation of Solution

 Total number of vulnerabilities:

  • The risk is been analyzed based on computing platform.
    • High Risk
    • Medium Risk
    • Low Risk
  • The details of security vulnerabilities are shown below:
PLATFORM

NUMBER

OF COMPUTERS

HIGH

RISK

MEDIUM

RISK

LOW

RISK

TOTAL

VULNERABILITIES

Windows Vista Ultimate356242871155
Linux1315498255
Windows Server111371967
Sun Solaris11229978778
Windows vista ultimate desktops and laptops19514161237247065
  • The total number of vulnerabilities for each platform is indicated in rightmost column of table.

 Potential impact of security problems:

The potential impact of security problems is shown below:

  • High risk vulnerabilities:
    • The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...

Explanation of Solution

 Platform to address:

  • First platform:
    • The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • The core system operations are affected by task of administrators.
  • Second platform:
    • The windows server with corporate applications denotes second platform.
    • The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • The Sun Solaris with e-commerce and web servers denote third platform.
    • The internal operations are ensured to be safe and secure...

Explanation of Solution

 Types of control problems:

  • The types of control problems includes:
    • General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

 Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by the information systems.
  • The top priority should be given the system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Students have asked these similar questions
I need to develop and run a program that prompts the user to enter a positive integer n, and then calculate the value of n factorial n! = multiplication of all integers between 1 and n, and print the value n! on the screen. This is for C*.
I need to develop and run a C* program to sum up integers from 1 to 100, and print out the sum value on the screen. Can someone help please?
Given the schema below for the widgetshop, provide a schema diagram. Schema name Attributes Widget-schema Customer-schema (stocknum, manufacturer, description, weight, price, inventory) (custnum, name, address) Purchased-schema (custnum, stocknum, pdate) Requestedby-schema (stocknum, custnum) Newitem-schema (stocknum, manufacturer, description) Employee-schema (ssn, name, address, salary) You can remove the Newitem-schema (red).
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education