Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 14, Problem 14.10E
Explanation of Solution
Ethical issues:
Organization can easily identify any insider attack with the help of the logging system to keep the track of the user activities inside the organization.
- The logging system is used to keep the track of all the users who access the system and try to detect the unusual activities.
- If an employee tries to access the unauthorized data, the data analysis software can easily detect such activities and sends an alert to administrator.
- The security of system can be improved...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A senior manager in a company is concerned about insider attacks from disaffected staff on the company's IT assets. As part of a resilience improvement program, she proposes that a logging system and data analysis software be introduced to capture and analyze all employee actions but that employees should not be told about this system. Discuss the ethics of both introducing a logging system and doing so without telling system users.
Susan is the lead investigator for a security incident and realizes that she will not be able to complete her investigation without causing severe disruption to the business. The action she feels she must take exceedsthe authority granted to her under the incident response plan. What should Susan do?
a)Shut down all business operations immediately until she develops a plan
b)Take the action immediately to protect the business
c)Discount the action as a possibility because it exceeds her authority
d)Consult with higher levels of management
Create a timeline that will detail how the week of pen testing will be conducted, the frequency of reporting, and the form of documentation of results that will be submitted. This should include a 1-page explanation of daily, weekly, and monthly security steps that the company should implement along with an explanation of how they will be implemented and what they will achieve
Chapter 14 Solutions
Pearson eText for Software Engineering -- Instant Access (Pearson+)
Knowledge Booster
Similar questions
- A project plan is a company's information security blueprint, but how does this occur?arrow_forward• What do you think are some of the difficulties in putting together a good logging and monitoring program since this goes far beyond just collecting and storing the logs somewhere.• What are valuable sources of logs during a security incident and how might these logs help resolve an operational or security issue?arrow_forwardAny organization or business that has had to deal witha cyber breach understands the stress that accompanies the process, no matter how well prepared or rehearsed it is for cyber events. All breaches come with a unique set of challenges and requirements. An incident response team often referred to as an IRT, is a team of individuals who are available, are ready, and have the expertise to investigate a data breach. IRT must understand the full scope of the breach to contain it, which typically includes understanding the entire life cycle of the attack. Forensic specialists can provide valuable information to the rest of the IRT team by examining logs, traffic, and systems to gain insight on the full scope of a breach. Discuss what the forensics investigators need to identify to understand how to scope the data breach incident.arrow_forward
- Suppose a worker in your organization frequently forgets his password, attempts to use obvious passwords, reuses old passwords, and sometimes gets locked out of the system for failed login attempts. How would you deal with such a user? What organizational policies should be in place for handling user behaviors of this kind?arrow_forwardReview each scenario carefully and respond to each question as either (very ethical, ethical, neither ethical nor unethical, unethical, very unethical) and justify your choice. A student found a loophole in the university computer’s security system that allowed him access to other students’ records. He told the system administrator about the loophole but continued to access others’ records until the problem was corrected two weeks later. The student’s action in searching for the loophole was: The student’s action in continuing to access others’ records for two weeks was: The system administrator’s failure to correct the problem sooner was:arrow_forwardSecurity breaches in information systems are very commonplace these days even though some organizations have what they believe is good security controls. Because of their vulnerability to threats from hackers, internal personnel, and poor management of Hardware and software devices, security controls always need revisiting.From my perspective as manager of the Accounts and Finance department, every security breach affects this department even if it is just down time to be at meetings, to discuss strategies and costs to repair damages. When the breaches occur, unauthorized access is gained to either, do something malicious to the organization's resources to steal or sabotage data for financial gain.This usually results in the company's reputation/integrity being damaged, Loss of revenue during downtime, high costs to repair and restructure. legal ramifications are expected as well if guilty persons are found or if customers decide to sew for breach of contract and losses.Two Reasons…arrow_forward
- Management of executing RPA Bots may involve a review of execution results. Briefly describe the steps you would expect to follow to access any Log results for a published RPA bot, and which log content you would expect to see based upon the content of the prior modules.arrow_forwardCybersecurity tools are available to organizations requiring integration of their problem management, configuration management, and incident management processes. The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cybersecurity tool. Incident Response Plan Incident response is a disciplined methodology for managing the aftermath of a security breach, cyberattack, or some other security incident. An incident response plan (IRP) provides an organization with procedures that effectively limit the impact on the data, system, and business and reduces recovery time and overall cost. Research an organization from the health care, finance, or education sector. Outline a 1- to 2-page IRP in Microsoft Word for the organization you chose. In your plan, ensure you: Discuss roles and responsibilities. Discuss the critical activities for each of the phases in the incident response process.…arrow_forwardPost a link to an article, or information resource regarding security monitoring or monitoring tools that can be used in an Industrial Control environment. Explain what issues do you find most relevant in the article or tools you have identified, and what considerations you think should be made when deploying security monitoring tools in an industrial environment. Are the tools the same? Is there recommendations specific for ICS environments?arrow_forward
- significant cause of security breaches is inappropriate entitlements. This can be caused by incorrect initial access rights settings, accumulation of entitlements over time, or even improper access rights for a user that were intentionally set by a roguecollaborating administrator. Entitlement accumulation can result from a lack of maintenance when an employee changes positions and maintains all of his or her old access rights. One frequent mistake many organizations make is terminating administrators while not immediately de-provisioning their accounts and removing all access rights. i.Discuss the why the mistakes identified are seen as problems. ii.Propose your solution to these problems.Support you answers with concepts learnt in classarrow_forwardWhat are the benefits of having an audit trail?arrow_forwardAs an IT Security Analyst or Cyber security Engineer use the STAR method to answer the below behavioral questions: Situation: Task: Action: Result: 1. Tell me about a time when you realized you needed a deeper level of subject matter expertise to do your job well. What did you do about it? What was the outcome? Is there anything you would have done differently? 2. Describe a time when you took on work outside of your comfort area. How did you identify what you needed to learn to be successful? How did you go about building expertise to meet your goal? Did you meet your goal? 3. Tell me about a time when you didn’t know what to do next or how to solve a challenging problem. How do you learn what you don't know? What were the options you considered? How did you decide the best path forward? What was the outcome?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,