EBK SOFTWARE ENGINEERING
EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 9780133943238
Author: SOMMERVILLE
Publisher: PEARSON CO
Expert Solution & Answer
Book Icon
Chapter 14, Problem 14.10E

Explanation of Solution

Ethical issues:

Organization can easily identify any insider attack with the help of the logging system to keep the track of the user activities inside the organization.

  • The logging system is used to keep the track of all the users who access the system and try to detect the unusual activities.
  • If an employee tries to access the unauthorized data, the data analysis software can easily detect such activities and sends an alert to administrator.
  • The security of system can be improved...

Blurred answer
Students have asked these similar questions
Suppose a worker in your organization frequently forgets his password, attempts to use obvious passwords, reuses old passwords, and sometimes gets locked out of the system for failed login attempts. How would you deal with such a user? What organizational policies should be in place for handling user behaviors of this kind?
When managers in hotels plan to purchase new technologies or upgrade their existing systems in their establishments, what they need to be noticed in System security and Data security?
Chain Link Consulting is an information technology consulting company that focuses on system security concerns. When the company's president asks you to assist her with the preparation of a presentation for a group of potential clients at a trade show meeting next month, you say "yes." First and foremost, she would like you to examine system security concerns in light of all six security levels. Afterwards, she wants you to come up with a list of methods that Chain Link might evaluate a client's security procedures in order to obtain an accurate evaluation of their level of exposure.It was her way of making the situation more intriguing by saying that it was fine to be imaginative in your ideas, but that you should avoid proposing anything that would be unlawful or immoral. Example: It might be OK to pretend as a job candidate with phony references to see whether they were being reviewed, but it would be inappropriate to steal a lock and access the computer room to check on things.Your…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,