Question

In: Operations Management

Programming 101 teaches all students that security is the crucial part of any system.

Read the following prompt. Then, create a Word document (.docx) and, following the details provided in the prompt, respond appropriately.

Programming 101 teaches all students that security is the crucial part of any system. You must secure your data! It appears that some people working for the State of Oklahoma forgot this important lesson when tens of thousands of Oklahoma residents had their sensitive data-including numbers-posted on the Internet for the general public to access. You have probably heard this type of report before, but have you heard that the error went unnoticed for three years? A programmer reported the problem, explaining how he could easily change the page his browser was pointing to and grab the entire database for the State of Oklahoma. Also, because of the programming, malicious users could easily tamper with the database by changing data or adding fictitious data. If you are still thinking that isn’t such a big deal, it gets worse. The website also posted the Sexual and Violent Offender’s Registry. Yes, the Department of Corrections employee data were also available for the general public to review. Conduct research on similar breaches and address each of the following questions, citating all sources:

Why is it important to secure data?

What can happen if someone accesses your customer database?

What could happen if someone changes the information in your customer database and adds fictitious data?

Who should be held responsible for the State of Oklahoma data breech? Why?

What are the business risks associated with database security?

Solutions

Expert Solution

This answer contains the right information, if you like it please give a thumbs up. It will be highly appreciated.

It is important to secure data for the following reasons-

  • Prevent financial loss

  • Protect sensitive information

  • Save passwords

  • Security from malware attacks

If someone accesses your customer database, private information can be stolen, modified or deleted. This can harm the customers, as well as others.

If someone adds fictitious data in the customer database it can lead to confusion and chaos, personality theft and many more.

At this point, the security of database people should be held responsible and there should be a proper investigation on the whole case because it’s a big issue, especially concerning safety.

Business risks associated with database security are as follows-

  • Degraded brand reputation

  • Loss of customers and their trust

  • Exploitation of vulnerability

  • Security threat for personal information of the company as well as the customers

  • Compromised data


Related Solutions

1. A random sample of 2,500 students is taken from the population of all part-time students...
1. A random sample of 2,500 students is taken from the population of all part-time students in the United States, for which the overall proportion of females is 0.6. There is a 95% chance that the sample proportion (p̂) falls between ______ and _______. 2. The Federal Pell Grant Program provides need-based grants to low-income undergraduate and certain postbaccalaureate students to promote access to postsecondary education. According to the National Postsecondary Student Aid Study conducted by the U.S. Department of...
Discuss the effects of the social security system on income distribution in all aspects.
Discuss the effects of the social security system on income distribution in all aspects.
Is there any systematic tendency for part-time college faculty to hold their students to different standards...
Is there any systematic tendency for part-time college faculty to hold their students to different standards than do full-time faculty? The article “Are There Instructional Differences Between Full-Time and Part-Time Faculty?” (College Teaching, 2009: 23-26) reported that for a sample of 125 courses taught by full-time faculty, the mean course GPA was 2.7186 and the standard deviation was 0.63342, whereas for a sample of 88 courses taught by part-timers, the mean and standard deviation were 2.8639 and 0.49241, respectively. Does...
JAVA programming - please answer all prompts as apart of 1 java assignment. Part A Create...
JAVA programming - please answer all prompts as apart of 1 java assignment. Part A Create a java class InventoryItem which has a String description a double price an int howMany Provide a copy constructor in addition to other constructors. The copy constructor should copy description and price but not howMany, which defaults to 1 instead. In all inheriting classes, also provide copy constructors which chain to this one. Write a clone method that uses the copy constructor to create...
When would you expect the Social Security system to begin to experience difficulties, if any? Why?
When would you expect the Social Security system to begin to experience difficulties, if any? Why?
An account is a part of the financial information system and is described by all except...
An account is a part of the financial information system and is described by all except which one of the following? An account may be part of a manual or a computerized accounting system. An account has a title. An account is a source document. An account has a debit and credit side.
ANSWER ALL PARTS. DO NOT SKIP ANY PART. ATTEMPT ONLY IF YOU CAN EXPLAIN EACH PART...
ANSWER ALL PARTS. DO NOT SKIP ANY PART. ATTEMPT ONLY IF YOU CAN EXPLAIN EACH PART STEP BY STEP Jarvene Corporation uses the FIFO method in its process costing system. The following data are for the most recent month of operations in one of the company’s processing departments: Units in beginning inventory 390 Units started into production 4,290 Units in ending inventory 340 Units transferred to the next department 4,340 Materials Conversion Percentage completion of beginning inventory 80 % 20...
Part II: Linear Programming Model- Forbelt Corporation has a one-year contract to supply motors for all...
Part II: Linear Programming Model- Forbelt Corporation has a one-year contract to supply motors for all refrigerators produced by the Ice Age Corporation. Ice Age manufacturers the refrigerators at four locations around the country: Boston, Dallas, Los Angeles, and St. Paul. Plans call for the following number (in thousands) of refrigerators to be produced at each location: Boston 50 Dallas 70 Los Angeles 60 St. Paul 80 Forbelt’s three plants ae capable of producing the motors. The plans and production...
please answer all questions and not just part: 1. Is the pay system in the british...
please answer all questions and not just part: 1. Is the pay system in the british government equitable? What is the reward system based on? 2. How does an organization achieve internal consistency?
Approximately 60% of all part-time college students in the United States are female. In random samples...
Approximately 60% of all part-time college students in the United States are female. In random samples of size 100 taken from the population of all part-time college students: Describe the sampling distribution of the sample proportion of part-time female college students. What is the probability that the sample proportion of part-time female college students is at most 0.51? What is the probability that the sample proportion of part-time female college students is at least 0.67? What is the probability that...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT