Question

In: Computer Science

Computer Security Consider a desktop publishing system used to produce documents for various organizations. a. Give...

Computer Security

Consider a desktop publishing system used to produce documents for various organizations.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

Solutions

Expert Solution

a. Confidentiality: A publication for internal circulation and consumption for any organization needs the most confidentiality. This is even more applicable if the same system is producing documents for rival organizations (such as both Coca Cola and PepsiCo)

b. Integrity: Mostly publications involving data need to have the highest integrity. Publications involving maps need to be presented in a certain universal format. Another example could be related to publications of a certain dimension (such as a tabloid or a newspaper) which are almost always in a fixed dimension.

c: Availability: For the desktop publication system which is working online, availability is most important. Any number of users can come online at any instance and the system should be ready to address their requirements. [Example - Add-ons on a publication system which need to be downloaded. If many people start downloading them at the same time, their requests should be serviced simultaneously with least delay]


Related Solutions

Network Security Consider a financial report publishing system used to produce reports for various organizations i....
Network Security Consider a financial report publishing system used to produce reports for various organizations i. Give an example of a type of publication in which confidentiality of the stored data is the most important requirement ii. Give an example of a type of publication in which data integrity is the most important requirement iii. Give an example in which system availibility is h most important requirement
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
2. Consider the same computer system used in problem 1. The following trace of accessed page...
2. Consider the same computer system used in problem 1. The following trace of accessed page numbers was recorded over time: 1, 0, 2, 2, 1, 7, 6, 7, 0, 1, 2, 0, 3, 0, 4, 5, 1, 5, 2, 4, 5, 6, 7, 6, 7, 2, 4, 2, 7, 3, 3, 2, 3. The first two page references were reads, while the third was a write, and every third reference after that was also a write operation. c) Assuming...
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
Describe and give examples of the 2 most significant computer security threats that are impacting the...
Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time. (b) What steps are being taken to minimize or thwart these threats? (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens? (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a...
How are the statement of cash flow used by organizations--- give a specific example?
How are the statement of cash flow used by organizations--- give a specific example?
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function,...
Computer and Internet Security: a Hands on Approach 5.3 Instead of jumping to the system() function, we would like to jump to the execve() function to execute "/bin/sh". Please describe how to do this. You are allowed to have zeros in your input (assume that memcpy() is used for memory copy, instead of strcpy())
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT