Question

In: Computer Science

Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...

Part 2: Software security:
Assume you are performing preliminary security risk assessment.
1. The first step in performing a preliminary risk assessment is asset identification. List down three
assets you identify in an in-store automated supermarket shopping system when conducting
the preliminary risk assessment.
2. Identify two possible security risks associated with an in-store supermarket shopping system and
propose a system requirement that might reduce each of those risks.

Solutions

Expert Solution

Preliminary Security Risk

Security Risk Assessment

It is a Software Risk under the Security Risk Assessment. It is mainly used for identifying and understanding the risk to system and data. While performing Security Risk Assessment there are different stages of risk assessment which are performed throughout the Software Development Lifecycle.

Preliminary Security Risk

It is the Generic Risk that is applicable to the system. And here the stage is performing the adequate level of security at a reasonable cost.

The first step performing the risk assessment management system is asset identification.

In-Store Automated Supermarket Shopping System have many assets while conducting the preliminary risk assessment system.

Asset Identification mainly have

1. Asset Register.

It is the document that specifies all the places where you keep sensitive information.

The best way to identify assets is to interview asset owners. The asset owner is the individual or entity which is responsible for controlling the production, development, maintenance, use and security of an information asset.

So, in-store automated supermarket shopping system have the asset owner as the person who runs the supermarket who controls the entire system.

Here the supermarket may definitely have a production system which generate the items needed for customers.

The production of items may segregate according to the customers need or the relevant quantity of segregation can be done by this stage.

The place and the things should be properly maintaining for the customers use and mainly for the futuristic purpose.

All the goods should be used in a proper way and the security of things should also be monitored to avoid the misuse of things.

2. After finishing Asset Register, we have to find the vulnerability and threat associated with the system.

A threat is any incident which affect the system in a negative way.

In in-store automated supermarket shopping system should have security to avoid the misuse of things, theft, or accessing the data by unauthorized person.

And security may support to avoid destroy, damage of asset.


Related Solutions

Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing...
Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
Part 1: Software Testing (6 marks): Assume that you are building a web-based grocery shopping system...
Part 1: Software Testing : Assume that you are building a web-based grocery shopping system (similar to the ones that Woolworths and Coles provide). The system allows customers to add grocery items to a (virtual) shopping cart and pay online. They will then be notified when the order is ready for pick-up in the selected store. 1. Identify one functional and one non-functional requirement related to that system . 2. Describe how you would test those two requirements . 3....
When performing an Inherent risk assessment of a company and you need to make a comment...
When performing an Inherent risk assessment of a company and you need to make a comment about the 'going concern risk'. would you just analyze the financial statements? and how would you structure the comment?
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
Part 1 (30 marks) IT Software Project As a senior analyst for the company you have...
Part 1 IT Software Project As a senior analyst for the company you have been asked to evaluate a new IT software project. The company has just paid a consulting firm $50,000 for a test marketing analysis. After looking at the project plan, you anticipate that the project will need to acquire computer hardware for a cost of $400,000. The Australian Taxation Office rules allow an effective life for the computer hardware of five years. The equipment can be depreciated...
Details on how you can test for risk and conduct a security assessment using CCTV security...
Details on how you can test for risk and conduct a security assessment using CCTV security camera? Also, explain the risk mitigation?
Part 2 (20 marks) Risk and return You are considering an investment in the stock market...
Part 2 Risk and return You are considering an investment in the stock market and have identified two potential stocks, they are Westpac Banking Corp. (ASX: WBC) and Singapore Airlines Ltd. (SGX: C6L). The historical prices for the past 10 years are shown in the table below Year ASX: WBC SGX: C6L 2009 23.70 13.82 2010 22.85 14.76 2011 21.01 11.1 2012 27.85 10.99 2013 30.66 9.59 2014 34.23 12.65 2015 30.85 11.03 2016 31.71 9.9 2017 30.96 11.31 2018...
Part 2 (20 marks) Risk and return You are considering an investment in the stock market...
Part 2 Risk and return You are considering an investment in the stock market and have identified two potential stocks, they are Westpac Banking Corp. (ASX: WBC) and Singapore Airlines Ltd. (SGX: C6L). The historical prices for the past 10 years are shown in the table below Year ASX: WBC SGX: C6L 2009 23.70 13.82 2010 22.85 14.76 2011 21.01 11.1 2012 27.85 10.99 2013 30.66 9.59 2014 34.23 12.65 2015 30.85 11.03 2016 31.71 9.9 2017 30.96 11.31 2018...
What will you review and assess in the User Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT