Question

In: Computer Science

Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...

Part 2: Software security:
Assume you are performing preliminary security risk assessment.
1. The first step in performing a preliminary risk assessment is asset identification. List down three
assets you identify in an in-store automated supermarket shopping system when conducting
the preliminary risk assessment.
2. Identify two possible security risks associated with an in-store supermarket shopping system and
propose a system requirement that might reduce each of those risks.

Solutions

Expert Solution

Preliminary Security Risk

Security Risk Assessment

It is a Software Risk under the Security Risk Assessment. It is mainly used for identifying and understanding the risk to system and data. While performing Security Risk Assessment there are different stages of risk assessment which are performed throughout the Software Development Lifecycle.

Preliminary Security Risk

It is the Generic Risk that is applicable to the system. And here the stage is performing the adequate level of security at a reasonable cost.

The first step performing the risk assessment management system is asset identification.

In-Store Automated Supermarket Shopping System have many assets while conducting the preliminary risk assessment system.

Asset Identification mainly have

1. Asset Register.

It is the document that specifies all the places where you keep sensitive information.

The best way to identify assets is to interview asset owners. The asset owner is the individual or entity which is responsible for controlling the production, development, maintenance, use and security of an information asset.

So, in-store automated supermarket shopping system have the asset owner as the person who runs the supermarket who controls the entire system.

Here the supermarket may definitely have a production system which generate the items needed for customers.

The production of items may segregate according to the customers need or the relevant quantity of segregation can be done by this stage.

The place and the things should be properly maintaining for the customers use and mainly for the futuristic purpose.

All the goods should be used in a proper way and the security of things should also be monitored to avoid the misuse of things.

2. After finishing Asset Register, we have to find the vulnerability and threat associated with the system.

A threat is any incident which affect the system in a negative way.

In in-store automated supermarket shopping system should have security to avoid the misuse of things, theft, or accessing the data by unauthorized person.

And security may support to avoid destroy, damage of asset.


Related Solutions

Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing...
Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
When performing an Inherent risk assessment of a company and you need to make a comment...
When performing an Inherent risk assessment of a company and you need to make a comment about the 'going concern risk'. would you just analyze the financial statements? and how would you structure the comment?
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
Part 1 (30 marks) IT Software Project As a senior analyst for the company you have...
Part 1 IT Software Project As a senior analyst for the company you have been asked to evaluate a new IT software project. The company has just paid a consulting firm $50,000 for a test marketing analysis. After looking at the project plan, you anticipate that the project will need to acquire computer hardware for a cost of $400,000. The Australian Taxation Office rules allow an effective life for the computer hardware of five years. The equipment can be depreciated...
Details on how you can test for risk and conduct a security assessment using CCTV security...
Details on how you can test for risk and conduct a security assessment using CCTV security camera? Also, explain the risk mitigation?
Part 2 (20 marks) Risk and return You are considering an investment in the stock market...
Part 2 Risk and return You are considering an investment in the stock market and have identified two potential stocks, they are Westpac Banking Corp. (ASX: WBC) and Singapore Airlines Ltd. (SGX: C6L). The historical prices for the past 10 years are shown in the table below Year ASX: WBC SGX: C6L 2009 23.70 13.82 2010 22.85 14.76 2011 21.01 11.1 2012 27.85 10.99 2013 30.66 9.59 2014 34.23 12.65 2015 30.85 11.03 2016 31.71 9.9 2017 30.96 11.31 2018...
What are the stages of preliminary risk assessment? What information should be included in a misuse...
What are the stages of preliminary risk assessment? What information should be included in a misuse case? Suggest two possible vulnerabilities when login/password authentication is used?
(7 marks) You are performing a separation experiment with gas chromatography and notice that your peaks...
You are performing a separation experiment with gas chromatography and notice that your peaks have overlapping elution times. Provide three possible approaches you could take to improve the resolution of the peaks. Explain how these changes would provide a higher resolution using the resolution equation. Which of your listed approaches would be the most cost effective?
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility.
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility. What are some methods you can use to overcome these challenges?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT