Provide a pin and a card for access

Assignment Help Computer Engineering
Reference no: EM131812586

Assignment

Length: 1-2 pages (excluding the title page and reference pages) and double-spaced

1. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.

2. Consider a desktop publishing system used to produce documents for various organizations.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

3. For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

a. An organization managing public information on its Web server.

b. A law enforcement organization managing extremely sensitive investigative information.

c. A financial organization managing routine administrative information (not privacy-related information).

d. An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.

e. A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.

Reference no: EM131812586

Questions Cloud

Does the brokerage offer marketing services : Does the brokerage offer marketing services? What kind of desk fees do they charge and what is the beginning commission split.
Flowchart with appropriate floechart symbols : Please prepare a FLOWCHART with appropriate FLOECHART symbols to represent the procedures and documents for cash collections from credit customers
What is the expected contribution margin ratio : Baker Co. expects to maintain the same inventories at the end of 2012 as at the beginning of the year. What is the expected contribution margin ratio
Prepare a flowchart with appropriate flowchart symbols : Please prepare a flowchart with appropriate flowchart symbols to represent the procedures and documents for cash collections
Provide a pin and a card for access : Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access.
Why are credit reports and income and employment checks : Can you see situations where appraisals, credit reports, and employment checks can derail refinance transactions? Please discuss.
What is the statistic involved : A researcher wishes to estimate the proportion of all adults who own a cell phone. He takes a random sample of 1,572 adults; 1,298 of them own a cell phone.
Please prepare a flowchart with appropriate : Please prepare a flowchart with appropriate flowchart symbols to represent the procedures and documents for cash collections from credit customers.
What is the parameter of interest : A sociologist wishes to estimate the proportion of all adults in a certain region who have never married. In a random sample of 1,320 adults.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd