Discuss policies of the abc password management system

Assignment Help Computer Engineering
Reference no: EM131723685

ABC has several branch offices across Australia with about 60 mobile sales employees at each branch office. Each employee is provided with an iPad and smartphone as well as access permission to remotely read and upload data to the database server at their branch office. The chief information security officer (CISO) at ABC believes that the use of password and malicious software (malware) poses threat to the database at ABC. The CISO estimates that a successful malware attack will cost ABC $28,000 for hiring external security consultant, $15,000 for containment and cleaning and $50,000 due to losses of sales. In order to mitigate the password related threats, ABC's password management system automatically rejects passwords that are found in the dictionary, passwords that are not seven characters long and passwords that do not have at least one capital letter, one number and one special character. The password management system also lockouts after a three failed log-in attempts. To mitigate malware risks, the ABC management is planning to purchase an antimalware solution at a cost of $50,000. It is expected that the annualized loss expectancy will be reduced to $75,000 if the antimalware solution is deployed on ABC system.

QUESTIONS

For each of the following question, you must justify your answer and where applicable show step by step your work including all appropriate formulas required to arrive at your answer. An answer without justification, step by step description and formulae will be given zero mark.

1. Briefly describe what policy or policies the ABC password management system is enforcing.

2. Calculate the annualized loss expectancy assuming that the probability of a successful malware attack is 2.5 times every two years.

3. Would you recommend the ABC management to proceed with the purchase of the antimalware solution? Explain why or why not.

Reference no: EM131723685

Questions Cloud

Report the point estimate of the population mean : (a) Report the point estimate of the population mean. (b) Find and interpret the standard error of the sample mean.
What should you do when you are finished showing a home : Role-play a property showing in which the buyers show interest in the remodeled kitchen, the bathrooms, and the swimming pool.
Developing an effective marketing strategy can be tough : Developing an effective marketing strategy can be tough. Without one, however, a small business will be fighting for survival.
Find the upper and lower limits of the confidence interval : Explain what this represents and find the upper and lower limits of the confidence interval around the mean.
Discuss policies of the abc password management system : Briefly describe what policy or policies the ABC password management system is enforcing
Who are some of your external customers : In your current job, who are some of your internal customers?, who are some of your external customers?
Solve problem related to sweetness of orange juice : Sweetness of orange juice. Refer to Exercise and the simple linear regression relating the sweetness index (y) of an orange juice sample to the amount of water.
Threats within the uber external environment : Identifying opportunities and threats within the Uber's external environment.
Discuss the concept of neighborly love : Discuss the concept of neighborly love covered in ch 14. Discuss the heuristic value of homer and the entire simpsons ) as proposed in ch 15.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd