Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Suggest the most appropriate security measures for each of the situations descri

ID: 3606145 • Letter: S

Question

Suggest the most appropriate security measures for each of the situations described below.

a. A bank uses an electronic funds transfer (EFT) system to transmit sensitive financial data between its branches all over the world.

b. A fighter jet simulation company has set up an off-site computer-based training center for the F-35. The company wishes to restrict access to the site to authorized employees. Since each employee's use of the center is occasional, it does not wish to provide the employees with keys to access the center.

c. A golf club uses a simple password system to protect its database. The club has created a new web site to allow both its members and its employees to use the new web-based system to access and update information. The club finds that it needs a more comprehensive security system to grant different privileges (such as read-only versus create or update) to different users.

d. A training center at the local university has experienced considerable difficulty with unauthorized users who access files and databases by appropriating passwords from legitimate users.

Explanation / Answer

case a: In this case appropriate security measure would be Encryption.
In the encryption technique, data is being converted into different form using mathematical algorithms. For example, 1000 can be converted to *$12 and then send over network.

case b: For this case appropriate security measure would be Authorisation Rules.
Privilages can be given to specific users by Authorisation process. For example, users who register on Chegg.com can view full answers. Thus in this case Authorisation rule is, whether user is registered or not.

case c: For this case appropriate security measure would be Authentication schemes.
Authentication is the process where user needs to follow verfication process to get indiual privilages. Based on authentication scemes user may get readonly, write privilages. Thus in given case a golf club can set criterias to assign system access privilages to indiviual users as per criterias.

case d: In this case appropriate security measure would be Authorisation Rules.
By authorisation rules system can found out unauthorised users and restrict access to the system.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote