Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 17, Problem 4MBD
Explanation of Solution
Importance of securing data:
- Leaked data could have serious consequences for employees and public.
- Privacy breaches leads to fines, bas press, reputation damage and loss of trust.
- The residents’ personal information should be protected.
- Breaching data protection act may lead to huge fines and it cannot protect job.
Accessing customer
- If customer database is been accessed by someone then name as well as other personal information are stolen.
- This private information could be used for fraudulent purposes.
- This information is misused to apply for credit cards, driver’s licenses and other documents.
- This may destroy credit for person and it will reflect in loan schemes of person.
- The social security numbers may reveal entire personal data of person.
- The hackers may even update information for fraudulent activities.
Changing data in customer database:
- If data in customer database is updated then it creates serious issues.
- If new data is been added to violent offenders list illegally then it affects innocent people.
- It may result in facing of legal procedures for the innocent people in customer database...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What are the key considerations in software product security, and how can organizations mitigate security risks and vulnerabilities throughout the software development lifecycle?
Discuss the challenges and solutions related to security in software development, including topics like code vulnerabilities, penetration testing, and secure coding practices.
Discuss the importance of secure coding practices in software development. What are some common security vulnerabilities, and how can developers mitigate them during the development process?
Knowledge Booster
Similar questions
- Imagine you are the project manager of EISS enterprise software development house. You are managing the development of an Enterprise Software and one of your team is about to develop the security aspects of the software. List the security requirements that you will ask them to consider and explain each of themarrow_forwardThe computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this module and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology. After reading the information presented in this module and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies’ systems. Denial of service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this module and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security…arrow_forwardHow can software product security vulnerabilities be identified and mitigated throughout the development process?arrow_forward
- Why is software security so important in the software development lifecycle (SDLC)? What is software security?arrow_forwardUsing a project that aims at developing an online banking system for a Canadian bank, identify 3 areas where you expect to see the highest security risks. Explain what types of risks may be associated with the identified areas, and indicate what types of tests you will need to carry out to fully incorporate security as part of the overall Software testing & Quality Assurance in the projectarrow_forwardWhat are the challenges in ensuring security as a part of software quality, and how can they be mitigated?arrow_forward
- Is there any government surveillance on organizations to ensure they aren’t invading, selling, or sharing personal information to outsiders? Since the process of building a software for safety critical systems is expensive, does that mean there is a high demand for professional who focus on safety and systems ?arrow_forwardWith Computer Systems evolving, so does the necessary Security and Protection policies needed to guarantee the safety of the user and the system. What do you think are Security Features that will be more expanded to other systems or improved in the future or a concept that can be studied to be used as a security feature (Give at least 2)? On the other hand, what existing feature do you think will become obsolete and must not be used any more (Give at least 1)?arrow_forwardQuestion related to software engineering/desinging Identify the Design Pattern for the security system and write down the code of your selected pattern.. In the Security System, the Monitoring Stations are responsible for generating the safety check report. A Report Handler interface is created with the definition of the two basic operations to create a report such as “setOutputPath” and “createReport”.Security system needs three types of reporting i.e. XML Report, CSV Report and Txt Report provided by different vendors where each vendor provide different operations for corresponding report as mentioned in Figure 2. Security system needs the intermediate class that should be responsible for creating the report in the appropriate format. The corresponding classes has the responsibility to manage the different operations within the two basic operations provided by the interface.arrow_forward
- please answer the following - Please select all that apply: 1. Some considerations for developing NFR's include? Auditability Backup and Restore Portability Conversion 2.Access Control services provide? Enforcement of Access Controls Enforcement of rules for changing access control rules Audit logging of access Access control attributes of files 3.Security logon banners provide the following protections? Deterrent Legal Protections Liability Protections Policy Awareness 4. Most of the cost of software defects are realized in what phase of the SDLC? Requirements and Design Implementation Testing Maintenance 5. "When it comes to Identity security requirements, the following security attributes for each user should be recorded?" User ID Group Membership Phone Number Security Privilegesarrow_forwardIdentify five examples of safety critical software and try and rank them in terms of their levels of integrityarrow_forwardDiscuss the concept of safety-critical software certification. What is the process of certifying software for use in safety-critical applications, and what organizations are responsible for such certifications in different industries?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning