Question

In: Computer Science

Computer Security Consider a desktop publishing system used to produce documents for various organizations. a. Give...

Computer Security

Consider a desktop publishing system used to produce documents for various organizations.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

Solutions

Expert Solution

a. Confidentiality: A publication for internal circulation and consumption for any organization needs the most confidentiality. This is even more applicable if the same system is producing documents for rival organizations (such as both Coca Cola and PepsiCo)

b. Integrity: Mostly publications involving data need to have the highest integrity. Publications involving maps need to be presented in a certain universal format. Another example could be related to publications of a certain dimension (such as a tabloid or a newspaper) which are almost always in a fixed dimension.

c: Availability: For the desktop publication system which is working online, availability is most important. Any number of users can come online at any instance and the system should be ready to address their requirements. [Example - Add-ons on a publication system which need to be downloaded. If many people start downloading them at the same time, their requests should be serviced simultaneously with least delay]


Related Solutions

Network Security Consider a financial report publishing system used to produce reports for various organizations i....
Network Security Consider a financial report publishing system used to produce reports for various organizations i. Give an example of a type of publication in which confidentiality of the stored data is the most important requirement ii. Give an example of a type of publication in which data integrity is the most important requirement iii. Give an example in which system availibility is h most important requirement
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
Imagine that you buy a new computer system with independent components including a new desktop computer...
Imagine that you buy a new computer system with independent components including a new desktop computer (with a CPU and a graphics card), new software, and a new monitor. You want to play games on the new system, but it runs games very slowly. You assume that the keyboard and mouse are not creating the problem; so, to figure out what is making the system run so slowly, you experiment with combinations of your old equipment with the new equipment....
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
2. Consider the same computer system used in problem 1. The following trace of accessed page...
2. Consider the same computer system used in problem 1. The following trace of accessed page numbers was recorded over time: 1, 0, 2, 2, 1, 7, 6, 7, 0, 1, 2, 0, 3, 0, 4, 5, 1, 5, 2, 4, 5, 6, 7, 6, 7, 2, 4, 2, 7, 3, 3, 2, 3. The first two page references were reads, while the third was a write, and every third reference after that was also a write operation. c) Assuming...
Answer the question: Some IT security personnel believe that their organizations should employ former computer criminals...
Answer the question: Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not? Notes: answer by using your own words, please. the name of the course is "Professional Computing Issues."
Differentiate among 4 various legal documents used in business transactions. Example: What is the difference between...
Differentiate among 4 various legal documents used in business transactions. Example: What is the difference between a Warranty deed and a Mortgage? That question counts as one document.
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
There are various methods which organizations can use to acquire a new system. Some of these...
There are various methods which organizations can use to acquire a new system. Some of these include: outsourcing, off-the-shelf software and in-house development. Select two of these three methods to acquire software and discuss the advantages and disadvantages of each. Which do you believe is the preferred method of systems acquisition
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT