SOFTWARE ENGINEERING >C<
SOFTWARE ENGINEERING >C<
null Edition
ISBN: 9781323165331
Author: SOMMERVILLE
Publisher: PEARSON C
Expert Solution & Answer
Book Icon
Chapter 13, Problem 13.4E

Explanation of Solution

Threats to Mentcare System:

Mentcare system is used in many healthcare facilities and is designed for use in clinics attended by patients suffering from mental health problems and records details of their consultations and conditions.

Some of the threats to Mentcare systems are:

  • Threat occurs at confidentiality of the system and its data: In the mentcare system, the confidentiality of the system and its data can disclose information to people or programs which are not authorized to have access of information.
    • Threat: An unauthorized user gains access to system and makes the system unavailable.
    • Control: One can control the above threat by only allowing system management from specific locations that are physically secure.
    • Security: One must take care that diverse keys are available in events of emergency and key distribution must be taken care.
  • Threat occurs at integrity of the system and its data: In the mentcare system, the system may damage or software and data may be corrupted programs by using these threats...

Blurred answer
Students have asked these similar questions
I need help filling out the table below..... complete the entries in the second column by specifying the security design principle thatapplies to each scenario.......
In this discussion, we will look at four alternative logical security measures that, if implemented, would boost the amount of control that the system security administrator has access to. If these measures were implemented, the amount of control that the administrator has access to would increase.
Many organisations across different industries seem to ignore architectural risk analysis. In youropinion, explain why you would support architectural risk analysis as a blueprint for any securityprogram.
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning