Pearson eText for Software Engineering -- Instant Access (Pearson+)
Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
Expert Solution & Answer
Book Icon
Chapter 13, Problem 13.7E

Explanation of Solution

Attacks on equity trading system:

In the equity trading systems, user accounts and equity prices are replicated across servers so that orders can be placed making use of user account database, a price database and an order transaction database.

Some of the attacks that can happen to equity trading system and the stratergies to counter them are:

  • Attack in which a malicious user gains access to the system using accredited user credentials and then malicious orders are placed and stock is bought and sold.

    The strategy to counter attack is mentioned below:

    • Resistance: In order to place an order a dealing password is required which must be different from login password.
    • Recognition: One can send a copy of order by email to authorized user with contact phone number and maintain user’s order history and unusual trading patterns...

Blurred answer
Students have asked these similar questions
Create a BPMN model (2) (Business layer) of the following Business scenario: The company’s sales department receives an order from a buyer, while the finance department checks the buyer’s credit, and sends him/her an invoice when the order is fulfilled by the warehouse department. The order is considered complete if the buyer’s credit is sufficient, or the goods are in stock, otherwise the order fails, and the invoice isn’t sent. To fulfill the order, the warehouse department checks the availability of the order in the stock then allows to pick and then ship the order if it is available otherwise it is considered out of stock. In either case, the invoice is sent, and the order is considered complete, otherwise the order is failed.
Create any four scenarios that could possibly lead to deadlock
Denial of Service attacks are estimated to happen once every six months (twice a year) in a mid-size company. One such company, XYZ, estimates the cost of recovering from a single DoS attack to be $12000. The company decides to apply a number of controls to counter these attacks. With these controls, the frequency of successful DoS attacks against the company reduces to once a year and the cost of recovering from an instance becomes $8000. The cost of implementing these controls is $7,000 a year. From a purely financial point of view, is it worth for the company to implement these controls? Calculate the prior and post ALE and do a cost-benefit analysis to answer the question. In your answer make sure that you indicate what ARO, SLE and ALE are with and without controls. State clearly whether the company should implement the controls and explain why.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,