Security considerations

Assignment Help Management Information Sys
Reference no: EM13997926

Your manager is quite impressed with the security considerations you explained to her thus far; however, she asks that you give further thought to additional security measures where possible, and to develop a memo citing those additional safeguards. Complete the following assignment:

Write a ½ page memo describing additional security considerations you would add to a requirement definition in addition to those outlined in Chapter 7.

Feel free to utilize outside (online) sources to expand your list of necessary security measures.

Be sure to cite any sources.

Your memo should be professionally written and should not simply be a restating or paraphrasing of the sources researched or the textbook. It should be a personal view of the issue and your ideas on how to avoid them.

You did the one last week for me.  Can you continue on with it ?  I have attached it for reference.  Also please be original in the content and cite any resources used.

January 20, 2016

To: Mr. Tuew Dewiere

From: Smith Jone, CTO

Subject: Regarding Use of programming language .NET

Asp.net is some piece of the entirety. NET structure, based on top of the Common Language Runtime (otherwise called the CLR) - a rich and adaptable construction modeling, planned not simply to cook for the needs of engineers today, however to take into account the long future we have in front of us. What you may not understand is that, not at all like past redesigns of ASP, Asp.net is truly more than simply a redesign of existing engineering – it is the passage to an entire new time of web improvement.

Asp.net has been intended to attempt and keep up language structure and run-time similarity with existing ASP pages wherever conceivable. The inspiration driving this is to permit existing ASP Pages to be at first relocated Asp.net by basically renaming the document to have an amplification of .aspx. Generally this objective has been attained, in spite of the fact that there are normally some fundamental code changes that must be made, since VBScript is no more underpinned, and the VB dialect itself has changed.

The .NET Framework incorporates another information access engineering named Ado.net, an evolutionary change to ADO. In spite of the fact that the new information access innovation is evolutionary, the classes that make up Ado.net look somewhat like the ADO objects with which you may be recognizable. Some reasonably huge progressions must be made to existing ADO applications to change over them to Ado.net. The progressions don't need to be made instantly to existing ADO applications to run under Asp.net, in any case.

In end, I would like to conclude that the use of .NET for project development by the team is good decision but only in those cases where it will not affect the financial position of the company as a whole. Other factors are also relevant so they should also be considered while making the decision.

Reference no: EM13997926

Questions Cloud

What is the equivalent resistance for this combination : Resistors of values R1 = 6.00 Ohm, R2= 5.00 Ohm, R3= 11.00 Ohm and R4 = 8.00 Ohm are combined as shown. What is the equivalent resistance for this combination?
Find the coefficient of static friction for each given case : In both (a) and (b) the acceleration on the 5-kg box (M) is as large as it can be without the box sliding. Find the coefficient of static friction for each case if the magnitude of the acceleration is 4 m/s2.
How do you respond in a culturally sensitive manner : Which issues of biomedical ethics involved with this case? How could the APRN use one of the ethical models or theories to handle this situation? What are the legal issues? Are there any cultural/ethnic issues? How do you respond in a culturally s..
What about a hydrogen molecule : Show that a projectile with mass m can "escape" from the surface of a planet if it is launched vertically upward with a kinetic energy greater than mgRp, where g is the acceleration due to gravity at the planet's surface and Rp is the planet's rad..
Security considerations : Your manager is quite impressed with the security considerations you explained to her thus far; however, she asks that you give further thought to additional security measures where possible, and to develop a memo citing those additional safeguards. ..
What are the risks associated with directly executing user i : 3. What are the risks associated with directly executing user input ? What are the minimum steps needed to parse user input before it is allowed to be used in execution ?5. What are the risks associated with inheritance in classes ? What are generic ..
Test case creation : Using the following pseudocode, provide 3 unique test cases that would help validate your algorithm. Be sure to place the test cases in table showing the input values, and expected output for each test case. You must validate your code using ideate.c..
Brief summary of its general goals for the health system : Identify your group and give a brief summary of its general goals for the health system. Identify three groups that would be your friends and three groups that would be your foes. For each, explain why you believe this about them
Target operating system : After doing some research on the more notorious virus, worm, or spyware attacks in the last few years, choose a virus or worm then a briefly explain it in the following areas:(a) the name of the malware and category (virus,worm, etc.)

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the significant developments

Identify the significant developments that are occurring related to global integration and What implications does this have for the technology that an organization might have in its supply network?

  Information politicsone of the most critical problems faced

information politicsone of the most critical problems faced by the information technology department in virtually every

  How you would use the tool in the investigation

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. How you would use the tool in the investigation. How the tool helps the investigation and ..

  Research options for improving the current systems

Analyze the current business system in place: Who, what, when, how, and why? Research options for improving the current systems (including ERP, CRM & KM), and recommend additions to the system based on your assigned reading for this week

  Describe argument for the hims development method

Create an argument for the HIMS development method you think would be the most effective in a health care organization. Justify your response

  Define dynamic pricing

Name a company that uses data as a source of competitive advantage. Justify your response. Define dynamic pricing (in your own words) and provide an example not found in the text. Define the following terms: table, record, field. Provide another name..

  Prepare a paper on what a disruptive technology

Prepare a paper on what a disruptive technology is, how it is recognized, and its impact on other technologies, and provide three examples.

  He ceo of your company has recently contemplated

he ceo of your company has recently contemplated introducing a wireless element to the network as well as a virtual

  Evaluating various software tools for computer security

As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use

  Cross-functional systemthe clambake casethe clambake

cross-functional systemthe clambake casethe clambake company has been providing seafood to the northeast region of the

  A research the forms of data used in the system of your

a research the forms of data used in the system of your choice. this system could be your own health care organization

  Biggest hesitations to e-business

One of the biggest hesitations to E-business is the potential security threats. As an IT-manager what steps would you take to ensure your businesses online system was safe for customers to use

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd