What are possible risks to business

Assignment Help Basic Computer Science
Reference no: EM132610355

ABC Learning Center is a child care center the uses a local area network to run its business. Employees use a computer in the main room to check children in and out and complete of other necessary paperwork for the center. Records and financial information are kept on another computer located in a back room restricted to employees only. A Web server is also hosted in the back room; a router provides access to the Internet via a broadband DSL connection. The center does not use antivirus software, as the Internet access was primarily implemented to broadcast images from a webcam in the main room so that parents can check on the children via the Internet. Since you are enrolled in a Security Assessment and Auditing class at Tarrant County College, you have been recommended to assist ABC Company with a risk assessment. Complete the following questions based on information provided, (over).

1. What are possible risks to this business?

2. Research solutions you would recommend for this business. Explain.

3. Create an attack tree showing threats that may impact the ABC Learning Center. Please use the correct symbols.

Reference no: EM132610355

Questions Cloud

Several methods to attack and defeat crysysptotems : Malicious individuals have discovered several methods to attack and defeat crysysptotems.
What is blood plasma : 1) What is blood plasma,and what is its functions?
Do directory services provide discretionary access control : In terms of access to information: Do directory services provide Discretionary Access Control (DAC), Role-Based Access Control (RBAC), or both?
Estimate a fair stock price per share for Oakley : The Oakley brands are worth $100,000, their property plant and equipment is worth $140,000. Estimate a fair stock price per share for Oakley
What are possible risks to business : What are possible risks to this business? Research solutions you would recommend for this business.
What is an appropriate cost of capital : The risk-free rate of return is 4.8 percent. What is an appropriate cost of capital for a division within the firm that has an estimated beta of 1.16
Legal boundaries around retention : What steps and processes would you develop or implement at your organization to put legal boundaries around retention?
What is her cost of goods sold : During the year she purchased another 200 books but they cost $ 20 each. At the end of the year she has 60 books left. What is her cost of goods sold
Introduced some challenges to policy : Introduced some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Redisplays the menu after the user selected operation

Put the algorithms that you designed for Questions 1 and 2 together inside a loop that redisplays the menu after the user's selected operation is performed, or exits if the user selects item 4 from the menu.

  Qualitative v quantitative risk assessment.

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.

  Design moduleaccept an integer store input in the reference

Design a module, using pseudocode, named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prompt the user to enter a number and then store the input in the reference paramter variable.

  Business automated system

What is the role of the system administrator when it comes to security on a business' automated system?

  Describe an algorithm

Describe an algorithm for determining if a given list contains a cycle using only constant additional space. The runtime should be O(N), where N is the (unknown) number of elements in the list. (Hint: use two iterators that advance at different sp..

  Compare vcsat to vp in defining the nonlinear region

Compare VCsat to VP in defining the nonlinear region

  Improvement on political correctness

Perhaps you are concerned that political correctness frustrates the exploration of ideas and obscures the search for truth.

  Which multiplication is possible perform it using matlab

Generate a matrix D = [A;B]. Now generate a new matrix E = [D C]. Find the determinant of matrix E. Find the inverse of matrix E. Find the transpose of matrix E. Define a new matrix F = [16;3;17;12;-2]. Define another matrix H = [5 7 4 -2 -1;-9 3 12 ..

  Explain what is meant by effective html code

Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision.

  Gamut of mobile devices and bluetooth accessories

Invented by telecom vendor Ericsson in 1994, Bluetooth is a popular wireless technology standard for exchanging data over short distances. Bluetooth uses a packet-based protocol with a master-slave structure; one master may communicate with up to sev..

  Import random module for generating random numbers

Compute the time taken by each of these 3 algorithms (iterative selection sort, recursive selection sort and question 2) to sort 100 and 1000 random numbers.

  What is the 10-percentile and 90-percentile from the sample

What fraction of programs make less than or equal to 25 I/O's and what is the 90% confidenceinterval for the fraction?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd