Case Study 3: Security

In: Computers and Technology

Submitted By Spiderman5590
Words 1983
Pages 8
Case Study 3: Security

1. Analyze the new system and determine the design issues with this new system.

With any type of fast-food restaurant grease and other types of oils are used in the process to create the food that is delivered to the customers. Since these oils are being used to create the food the employees need to touch the food and most times to either cook it or deliver the food to the customers. The unfortunate handling of this food causes the employees to get grease on their hands and fingers. This can be an issue with the design because after time the grease built up will cause the screen to become unresponsive or unreadable as well. Another design issue that the new system has is a two part security issue. First is a lack of security giving the ability for employees to login into the register interface for other employees that have forgotten their user id and passwords. This is huge concern for the management because each employee is responsible and accountable for their time on the register and money that goes into the register as well. If other employees are logging into the system for them, and the register comes out short at the end of the night, there is no body to hold accountable for the missing money. This huge security risk for management, all employees should be held accountable for their time on the register and not be logging into the system for other employees.
The other security concern that is a design issue with the new system are the security features that are built into the interface. First off if an employee logs into the system and then forgets to log out and the system locks, other employees cannot login into the system. Employees require a user id to login into the system and they keep on forgetting either their user id or password. Another design issue is that the interface’s buttons are very close together…...

Similar Documents

Case Study Cyber Security

...process. The new one also translates into action. 2. What types of decisions are best suited for automated decision making? Provide several examples of successful applications from the companies in this case to illustrate your answer. There are many decisions best suited for automated decision making, but the first that stands out to me is that inputs are available electronically rather than human input. There is also more frequency in automated decision making. The automated decision making problems are not so broad, but are more narrow and well defined. One example of successful application is bank credit customers can complete the application within five minutes, at which point the automated process begins. After being used initially by airlines to optimize seat pricing, decision-making technology has since been applied to a variety of areas, includ­ing flight scheduling and crew and airport staff scheduling this is another good example of a successful application. Scheduling, staffing and fraud detection are some other good examples to illistrate sucessful applications. A credit report is pulled, the credit is scored, a property valu­ation is completed using online data, confirmations are made concerning fraud and flood insurance, and a final de­cision is made on the loan. 3. What role do humans play in automated decision-making applications? What are some of the challenges faced by managers where automated decision-making systems are being used? What solutions are......

Words: 527 - Pages: 3

Case Study Week 3

...Case Study Week 3 Principles of Info System Security Professor Gross by Nick Post Concerning the research collaboration of ABC Institute of Research and XYZ Inc., there are two standard methods that shall be considered for the encryption of all sensitive data being transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might......

Words: 451 - Pages: 2

Week 3 Case Study

...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it.  You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest  BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest......

Words: 341 - Pages: 2

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online are...

Words: 900 - Pages: 4

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online are...

Words: 900 - Pages: 4

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online are...

Words: 450 - Pages: 2

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online......

Words: 900 - Pages: 4

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online......

Words: 1800 - Pages: 8

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online are...

Words: 450 - Pages: 2

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online......

Words: 450 - Pages: 2

Cis 502 Case Study 3 Mobile Devices Security

...CIS 502 Case Study 3 Mobile Devices Security Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-3-mobile-devices-security Product Description Case Study 3: Mobile Devices Security The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”. Write a five to eight (5-8) page paper in which you: Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online......

Words: 450 - Pages: 2

Case 3: Physical Security

...CASE 3: PHYSICAL SECURITY p.64 Required: 1. Why are the auditors of Avatar stressing the need to have a better physical environment for the server? If Avatar has proper software controls in place, would that not be enough to secure the information? Ans. Auditors of Avatar are stressing the need to have a better physical environment for the server to secure and protect the infrastructure itself (hardware, sorftware and networking devices) as well as the information they hold from possible threats. The company may not only lose the investment they put for the servers and data but it can also impair their ability to function as a business. Evidently, software controls that are currently in place are not enough to secure the information. Additional control features must be considered to guarantee the security of the server and help them mitigate risks. 2. Name the six essential control features that contribute directly to the security of the computer server Ans. a. The physical location of the computer center directly affects the risk of destruction to a natural or man-made disaster. b. Computer center should be located in a single-story building of solid construction with controlled access c. Access to the computer center should be limited to the operators and other employees who work there. d. Computers function best in an air-conditioned environment, and providing adequate air conditioning is often a requirement of the vendor’s warranty e. The......

Words: 354 - Pages: 2

Sec 310 Wk 3 Case Study 2 Information Security

...310 WK 3 CASE STUDY 2 INFORMATION SECURITY To purchase this visit here: http://www.activitymode.com/product/sec-310-wk-3-case-study-2-information-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 310 WK 3 CASE STUDY 2 INFORMATION SECURITY SEC 310 WK 3 Case Study 2 Information Security and the National Infrastructure Read the Infosecurity magazine article “Using Information Security to Protect Critical National Infrastructure: Energy Sector is Hackers’ Biggest Target”, located at http://www.infosecuritymagazine. com/view/2310/using-information-security-to-protect-critical-national-infrastructure-energysector- is-hackers-biggest-target-/. Write a two to four (2-4) page paper in which you: 1. Explain in your own words the information security concerns that exist in protecting the United States’ national infrastructure. 2. Describe why the author of the article says that oil and gas industries are prime targets for cyber criminals more than other infrastructures and state whether or not you agree and why. More Details hidden... Activity Mode aims to provide quality study notes and tutorials to the students of SEC 310 WK 3 Case Study 2 Information Security in order to ace their studies. SEC 310 WK 3 CASE STUDY 2 INFORMATION SECURITY To purchase this visit here: http://www.activitymode.com/product/sec-310-wk-3-case-study-2-information-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 310 WK 3 CASE STUDY 2 INFORMATION SECURITY SEC 310 WK 3......

Words: 956 - Pages: 4

Cis 502 Week 7 Case Study 3 - Mobile Devices Security

...CIS 502 Week 7 Case Study 3 - Mobile Devices Security Click Link Below To Buy: http://hwaid.com/shop/cis-502-week-7-case-study-3-mobile-devices-security/ The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, Mobile device attacks surge andFIPS 140-2 Security Policy. In addition, read the report titled, Emerging Cyber Threats 2012. Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the Emerging Cyber Threats 2012 report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. 3. Assess and describe the value of cryptography and encryption in regard to Equifax s approach to implementing stronger security policies around mobile devices. 4. Justify Gunter Ollmann s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. 5. Several challenges of controlling information......

Words: 302 - Pages: 2

Case Study 3

...Case study 3 Procurement is a part of supply chain management. The main duty of procurement can include managing resources in productive firms which might be complexity. It is not all about purchasing, but also ordering and storage (Tumuhairwe and Ahimbisibwe 2016). However, it may not possible if the companies have no customers or partners to do a business with. The key factor that can keep the business to be insistent is to make contract to customers or business partners. The essay will analysis the case study and provide suitable solutions to solve all issues. Contract in business may be significant to keep relationship between firms and partners to the position that it should be. Contract management can be defined as the control of contracts which involved a company and its customers or partners (Lee, Lin and Pasari 2014). In order to create the business contract, all participants might be considering some relevant factors such as creation, negotiation, adherence, service level agreement, managing changes, documenting and analysing (Tumuhairwe and Ahimbisibwe 2016). According to the case study, there are two contractors such as police and Maybury Security Ltd (MSL) as well as there are serval sub-contractors in different part including facilities management, building construction, software development, data Centre management and systems integration. The issue was occurred by a failure of MSL’ s contract, the reason is because contractual performance was not attained......

Words: 753 - Pages: 4

Changing Course (Wrecked and Ruined #1) | Dr Seuss The Lorax | QuarkXPress v10.1.0.1.