Question

In: Computer Science

Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing...

Software security:

Assume you are performing preliminary security risk assessment.

1. The first step in performing a preliminary risk assessment is asset identification. List down three

assets you identify in an in-store automated supermarket shopping system when conducting

the preliminary risk assessment.

2. Identify two possible security risks associated with an in-store supermarket shopping system and

propose a system requirement that might reduce each of those risks.

Solutions

Expert Solution

1.) Assets identification while performing risk assessment and three assets you identify in an in-store super market shopping system :-

  • Assets identification while performing risk assesment can include --
  • Inventory and profit -- The super market calculates its annual profit and substract its annual reveue from annual operating expenses.
  • In the end of the year the inventory contributes to the amount of profits that the super market shopping system reports by lessing value of expenses.
  • Inventory and balance sheet -- Inventory can be reflected as an assets on super market shopping system because the market's balance sheet that represent its future earning potential.
  • Inventory and taxes -- The tax from super market shopping system used to report profit and loss includes a section for calculating preliminary profit based on cost of goods sold.
  • Three assets you identify in-store super market shpping system --
  • Inventory and profit
  • Inventry and Balance sheet
  • Inventory and taxes

2.) Identification of two possible security risk associated with in-store supermarket shopping system :-

  • Inventory damages -- the natural disaster can affect in stor supermarket shoping system.
  • the natural disasters damages physical structure, power outages and resulting in product losses.
  • so the risk managment strategy should include purchasing commercial property insurance policies which can cover inventory damages.
  • Fail to monitor competitors --
  • If in-store supermarket shopping system do not have digital presence, it can be difficult to check online to see competing business in your neighborhood, and to check weather they are active on social media or not.
  • Purpose system requirment that might reduce each of those risk :-
  • in-store supermarket should install physical security system which can be video monitoring equipment, locked display cases for the item which can be easly stolen, Sensor based product tags and lables and the sound of alerts when customer leave the store.
  • If most of your competitors are online then you can also consider for marketing consultants and web designer to help shape brand's digital presence.
  • Train the employees to identify shoplifters like sign of thives moving in large group, attemt to distract employees, and switch price tag and product packaging to purchase expensive items in chep rate.

Related Solutions

Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
When performing an Inherent risk assessment of a company and you need to make a comment...
When performing an Inherent risk assessment of a company and you need to make a comment about the 'going concern risk'. would you just analyze the financial statements? and how would you structure the comment?
Assume you are performing the calibration step of Experiment 8 and you begin with 80 g...
Assume you are performing the calibration step of Experiment 8 and you begin with 80 g of water at 20 oC and 80 g of water at 80 oC. After adding the two portions of water into your calorimeter setup and following the procedure outlined in the experiment, you determine the temperature of the mixed portions of water to be 45 oC. What is the heat capacity of the calorimeter? Assume room temperature is 25 oC. Answer in cal/C
Assume you are performing the calibration step of Experiment 8 and you begin with 20 g...
Assume you are performing the calibration step of Experiment 8 and you begin with 20 g of water at 20 oC and 20 g of water at 80 oC. After adding the two portions of water into your calorimeter setup and following the procedure outlined in the experiment, you determine the temperature of the mixed portions of water to be 45 oC. What is the heat capacity of the calorimeter? Assume room temperature is 25 oC.
Details on how you can test for risk and conduct a security assessment using CCTV security...
Details on how you can test for risk and conduct a security assessment using CCTV security camera? Also, explain the risk mitigation?
What are the stages of preliminary risk assessment? What information should be included in a misuse...
What are the stages of preliminary risk assessment? What information should be included in a misuse case? Suggest two possible vulnerabilities when login/password authentication is used?
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility.
Describe the benefits and challenges of performing a comprehensive risk assessment for a healthcare facility. What are some methods you can use to overcome these challenges?
3.2. Discuss the significance of Risk Assessment as a step in developing a Disaster Risk Profile....
3.2. Discuss the significance of Risk Assessment as a step in developing a Disaster Risk Profile. (10)
The first step in writing a software application is to determine the requirements. There is no...
The first step in writing a software application is to determine the requirements. There is no value in writing a program that does not address the needs of the client. Requirements can be gathered in many ways, but ultimately, the requirements serve to document what the application should and should not do. After the requirements are written, the application design can be prepared, followed by the actual coding. For this project, you will gain some practice in the design phase...
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than...
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than computer security. It covers a wide range of security measures like protecting the data or information from theft, misuse, natural disasters, social attacks, or hacking. How can we advance the security in payroll transactions? PLEASE MAKE COPY PASTE AVAILABLE
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT