Discuss about the confidentiality and integrity

Assignment Help Management Information Sys
Reference no: EM132240263

Question :

Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale.

Suggest specific actions that could be performed to minimize the vulnerabilities identified in Question 1 of this discussion. Describe how often these measures should be performed and the order in which each should be performed.

Reference no: EM132240263

Questions Cloud

Were you able to see this malware at both vendors : What likely effect will its emphasis on electronically stored information (ESI) have on an organization's need for a digital forensic capability?
How did each development influence american culture : What were the major developments in the evolution of mass media during the last century? How did each development influence American culture?
Identify and assess at least three professional skills : Identify and assess at least three professional skills that would be required to be successful database administrators.
Write response that presents the research hypothesis : Write a 2 page response that presents the research hypothesis below and why it is important to you. Include the null hypothesis and the research hypothesis.
Discuss about the confidentiality and integrity : Select at least three security vulnerabilities that could jeopardize and compromise a database.
Create a graph or chart to analyze the data : For each issue, create a graph or chart to analyze the data you have collected. Cite at least five credible sources excluding Wikipedia, dictionaries.
Why are you inspired to possibly research in this area : Why are you inspired to possibly research in this area and/or why do you think it is important to research in this area?
What type of countermeasures should have been implemented : Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack.
Describe what you learned from the article : A summary of what you learned from the article AND how it relates to a topic we covered that month. Your summary needs to be a minimum of five sentences.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Scientific research design no relationship between customer

scientific research design no relationship between customer satisfaction and loyaltyi need assistance on how to develop

  Find the received field in the headers

Find the "Received" field in the headers and write down as many DNS names or IP addresses as you can. Also look for common details in the header elements of the different messages, such as the same e-mail servers and spammers.

  Calculate this discount somewhere in the unit total column

ITEC 1001- Calculate this discount somewhere in the unit total column. Do not alter the mark-up percent! Shipping cost will be twenty cents per frisbee.

  Create a database diagram with the entities and attributes

Business Rules and Data Models to complete the lab:Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wan..

  Write about the negative aspects of social computing

Prepare a Power Point, Discussion Points to lead/engage the audiance, and a 2 page paper, summarizing the points All about The negative aspects of Social Computing

  Discuss the potential for service interruptions for systems

Discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable?

  Identify the potential risks found in the organization

DEFINE RISK as it pertains to risk assessment for a company - Identify the potential risks found in the organization

  Describe the scope and analyze how to control the scope

Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope.

  Important in the evolution of computer languages

How much a good program language designer should understand about programming? Explain your answer and indicate whether or not you agree with the points that Graham makes. Elements that Graham thinks will be important in the evolution of computer l..

  Examine how and why migration is increasing globally

Examine how and why migration is increasing globally. Address the increasing immigration situation in the U.S. .State and explain your perspective on whether the U.S. is inclusive or exclusive to migrants.

  Would you consider the use of a compliance tool

You were tasked by the the CIO to develop an IT compliance management program for your organization. What approach would you take to develop such a program? What regulations impact the organization? Would you consider the use of a compliance to..

  Develop the flow diagram of the information

Develop the flow diagram of the information and any control elements needed to ensure proper access for the information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd