MANAGEMENT INFORMATION SYSTEMS: MANAGING
MANAGEMENT INFORMATION SYSTEMS: MANAGING
16th Edition
ISBN: 9780135790939
Author: LAUDON
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 9HMP

Explanation of Solution

 Total number of vulnerabilities:

  • The risk is been analyzed based on computing platform.
    • High Risk
    • Medium Risk
    • Low Risk
  • The details of security vulnerabilities are shown below:
PLATFORM

NUMBER

OF COMPUTERS

HIGH

RISK

MEDIUM

RISK

LOW

RISK

TOTAL

VULNERABILITIES

Windows Vista Ultimate356242871155
Linux1315498255
Windows Server111371967
Sun Solaris11229978778
Windows vista ultimate desktops and laptops19514161237247065
  • The total number of vulnerabilities for each platform is indicated in rightmost column of table.

 Potential impact of security problems:

The potential impact of security problems is shown below:

  • High risk vulnerabilities:
    • The specific systems and files could be accessed by unauthorized personnel by misuse of passwords...

Explanation of Solution

 Platform to address:

  • First platform:
    • The Windows Vista Ultimate operated by high level administrators has access to areas that other users do not have.
    • The core system operations are affected by task of administrators.
  • Second platform:
    • The windows server with corporate applications denotes second platform.
    • The business conduction may be affected if corporate applications are corrupted.
  • Third platform:
    • The Sun Solaris with e-commerce and web servers denote third platform.
    • The internal operations are ensured to be safe and secure...

Explanation of Solution

 Types of control problems:

  • The types of control problems includes:
    • General controls:
      • It governs design, security, and use of computer programs and data file security.
      • It is applied to all computerized applications.
      • It consists of a combination of software, hardware and manual procedures that creates overall control environment.
        • Windows Vista ultimate for high level administrators.
        • Sun Solaris for e-commerce and web servers.
    • Application controls:
      • It denotes specific controls that are unique to each computerized application.
      • It includes payroll or order processing.
      • It includes both manual as well as automated procedures that ensure authorized data processing.
      • It can be classified as input controls, output controls and processing controls...

Explanation of Solution

 Risk of ignoring security vulnerabilities:

  • The technical, environmental and organizational threats can be faced by the information systems.
  • The top priority should be given the system security and it should be ensured by managers at all levels.
  • The security awareness should be spread to all employees...

Blurred answer
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education