The SBRU information system includes four subsystems: Resort relations, Student
ID: 3755563 • Letter: T
Question
The SBRU information system includes four subsystems: Resort relations, Student booking, Accounting and finance, and Social networking. The first three are purely Web applications, so access to those occurs through an Internet connection to a Web server at the SBRU home office. However, the Social networking subsystem has built-in chat capabilities. It relies on Internet access, as students compare notes before they book their travel reservations and as they chat while traveling. To function properly, the system obviously requires a wireless network at each resort. SBRU isn’t responsible for installing or maintaining the resort wireless network; they only plan to provide some design specifications and guidelines to each resort. The resort will be responsible for connecting to the Internet and for providing a secure wireless environment for the students.
1. For which subsystem(s) is(are) integrity and security controls most important? Why?
2. What data should be encrypted during transmission through resort wireless networks to SBRU systems? Does your answer change if students interact with SBRU systems using a cell phone (directly, or as a cellular modem)?
List at least five security controls for the subsystems.
In addition to describing the data that should be encrypted, what are the risks and potential consequences of data if it were exposed to hackers?
Explanation / Answer
Answer)
1) Yes, the integrity and security control is very much important as it contains the information about the students and accounts and financial information as well,
2) Sensitive data should be encrypted. For example the financial and accounts information and details in the social networking sites etc.
Yes, a cell phone would again have several restrictions to access the data with proper authentication mechanisms.
Some of the security control for the subsystems are:
1) Password protection is a must to access
2) Privileges to be given to access the files and folders
3) Multi-factor authentication to be used while any transactions
4) Encryption of the data which are sensitive is to be done.
5) Data to be backed up is a must.
The risk and potential consequences of data are as follows:
1) Vulnerable to attacks (External or intrusive)
2) The virus, malware attacks
3) Man-in-the-middle attack
Hit like if you find the answer useful. :)
Hope this answer helps. Thanks
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.