Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Risks and Threats to Computer Systems

In this assignment, you will consider the major security threats to an organization, and demonstrate your understanding of how to prevent these threats from materializing.

Using the South University Online Library or the Internet, research about the following:

Web applications

E-mail clients

Scenario

Paul Gray is the proprietor of a small share trading company allowing individuals to enter the stock market. He is currently running it with manual procedures and communicating with his clients using a free e-mail service provider and Skype telephone. He is planning to convert it to an online share trading company, but he is aware that there are security concerns when doing this. Gray needs his online trading portal to have the following key requirements:

It should allow its registered users to trade from any net-enabled PC.

It should allow real-time portfolio tracking.

It should enable instant credit and money transfer.

Its users should be able to communicate with the company using any e-mail service, free or paid.

You have been hired as a security consultant for Gray. You need to respond to the following queries in your initial meeting with Gray:

What are the possible security threats to the online trading portal? Who would be interested in attacking the portal? Why?

How may these security threats be mitigated? What are a few strategies that can be used to deter or prevent unauthorized use? At this point, these suggestions can be preliminary and non-technical, but they should suggest means of preventing or deterring attack on the system.

Gray does not realize that there are security threats to his current business model as well. Respond to the following questions related to the security concerns in Gray's business model:

What possible threats exist on free e-mail services? Consider the possible gain an attacker may have from attacking this system and enumerate several reasons why this would be a viable attack. Consider the risk of getting caught attacking this system. When would the payout make the attack worthwhile to the attacker? What factors would make this an undesirable target?

How is the free e-mail service different from the share trading portal? Analyze which of these systems represents a greater potential gain for the attacker and justify your conclusion. Which system carries more associated risk to complete the attack? Give examples to justify your answer.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92337021
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Information System

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Lab assignment storyboardingcomplete the lab based on the

Lab Assignment : Storyboarding Complete the lab based on the following: Follow the directions below to complete Lab Assignment : 1. Create a storyboard for a four (4) page Website (one (1) home page and three (3) sub pag ...

Question research how a risk assessment methodology process

Question : Research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page (do not count the abstract and reference page). The paper should have Abs ...

Discussion postpromptidentify one piece of propaganda that

Discussion Post Prompt Identify one piece of propaganda that circulates in current media today. Keep in mind that what might appear to be propaganda to you, might come across as informative or supportive to someone else, ...

Discussionsearch google scholar for a company school or

Discussion Search "google scholar" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to en ...

Using jython 50 or higherdevelop three new methods for the

Using Jython 5.0 or higher Develop three new methods for the Turtle class as follows: Add a method to the Turtle class to draw a rectangle given a certain width and height Add a method to the Turtle class to draw a simpl ...

Assignmentan acceptable use policy aup is a very important

Assignment An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are also legal implications within AU ...

Question 1 osi 7 layer modela what are benefits of using a

Question 1: OSI 7 layer Model. a) What are benefits of using a layered network model? b) Encryption takes place at which layer? c) Flow control takes place at which layer? d) Packets are found at which layer? e) Packet f ...

Assignmentyou are a member of the human resources

Assignment You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employees, customers, and suppliers. Your manager has r ...

Review the key barriers to his implementation found in

Review the key barriers to HIS implementation found in Chapter 7 of Essentials of Health Information Systems and Technology. Discuss the key benefits and value of HIS, and of technology investments and implementations. W ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As