Question

In: Computer Science

Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...

Part 2: Software security:
Assume you are performing preliminary security risk assessment.
1. The first step in performing a preliminary risk assessment is asset identification. List down three
assets you identify in an in-store automated supermarket shopping system when conducting
the preliminary risk assessment.
2. Identify two possible security risks associated with an in-store supermarket shopping system and
propose a system requirement that might reduce each of those risks.

Solutions

Expert Solution

Preliminary Security Risk

Security Risk Assessment

It is a Software Risk under the Security Risk Assessment. It is mainly used for identifying and understanding the risk to system and data. While performing Security Risk Assessment there are different stages of risk assessment which are performed throughout the Software Development Lifecycle.

Preliminary Security Risk

It is the Generic Risk that is applicable to the system. And here the stage is performing the adequate level of security at a reasonable cost.

The first step performing the risk assessment management system is asset identification.

In-Store Automated Supermarket Shopping System have many assets while conducting the preliminary risk assessment system.

Asset Identification mainly have

1. Asset Register.

It is the document that specifies all the places where you keep sensitive information.

The best way to identify assets is to interview asset owners. The asset owner is the individual or entity which is responsible for controlling the production, development, maintenance, use and security of an information asset.

So, in-store automated supermarket shopping system have the asset owner as the person who runs the supermarket who controls the entire system.

Here the supermarket may definitely have a production system which generate the items needed for customers.

The production of items may segregate according to the customers need or the relevant quantity of segregation can be done by this stage.

The place and the things should be properly maintaining for the customers use and mainly for the futuristic purpose.

All the goods should be used in a proper way and the security of things should also be monitored to avoid the misuse of things.

2. After finishing Asset Register, we have to find the vulnerability and threat associated with the system.

A threat is any incident which affect the system in a negative way.

In in-store automated supermarket shopping system should have security to avoid the misuse of things, theft, or accessing the data by unauthorized person.

And security may support to avoid destroy, damage of asset.


Related Solutions

Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing...
Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
When performing an Inherent risk assessment of a company and you need to make a comment...
When performing an Inherent risk assessment of a company and you need to make a comment about the 'going concern risk'. would you just analyze the financial statements? and how would you structure the comment?
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the...
When performing Risk Analysis as part of the task Analyse Risk (which is part of the Strategy Analysis knowledge area of the Business Analysis Body of Knowledge), we may develop a risk register as a table of entries for each identified risk. For each identified risk we make a judgement about probability as being either low, medium or high. We also make a judgement about impact as being either low, medium, or high. These contribute to making a final judgement...
Details on how you can test for risk and conduct a security assessment using CCTV security...
Details on how you can test for risk and conduct a security assessment using CCTV security camera? Also, explain the risk mitigation?
What are the stages of preliminary risk assessment? What information should be included in a misuse...
What are the stages of preliminary risk assessment? What information should be included in a misuse case? Suggest two possible vulnerabilities when login/password authentication is used?
(7 marks) You are performing a separation experiment with gas chromatography and notice that your peaks...
You are performing a separation experiment with gas chromatography and notice that your peaks have overlapping elution times. Provide three possible approaches you could take to improve the resolution of the peaks. Explain how these changes would provide a higher resolution using the resolution equation. Which of your listed approaches would be the most cost effective?
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility.
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility. What are some methods you can use to overcome these challenges?
Conducting a Risk Assessment (10 marks) You will be given a list of organisation in week...
Conducting a Risk Assessment You will be given a list of organisation in week 3 by your lecturer and you can select any one organisation from them. The organisation uses various IT systems for its daily operations. Assume that you are appointed as an IT Systems Auditor for the chosen organisation and you are asked to provide a risk register must come up for the IT systems in the organisation. A brief introduction of the organisation and the IT systems...
Question 3.3                              (Total: 45 marks; part 1: 24 marks; part 2: 15 marks; part 3:...
Question 3.3                              (Total: 45 marks; part 1: 24 marks; part 2: 15 marks; part 3: 6 marks) Star Finder Inc. has provided the following information for the year ended December 31, 2021: Sales revenue $1,300,000 Loss on inventory due to decline in net realizable value $80,000 Unrealized gain on FV-OCI equity investments 42,000 Loss on disposal of equipment 35,000 Interest income 7,000 Depreciation expense related to buildings omitted by mistake in 2020 55,000 Cost of goods sold 780,000 Retained...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT