Sponsored Links


Results 1 to 4 of 4

Thread: CS507 Information Systems Assignment 04 (Graded) Spring Fall 2014

  1. #1
    Senior Member
    Join Date
    Oct 2012
    Posts
    323

    CS507 Information Systems Assignment 04 (Graded) Spring Fall 2014

    Sponsored Links1




    Sponsored Links

    CS507 Information Systems Assignment 04 (Graded) Spring Fall 2014 Last Date 24th July 2014






    2.5+2.5

    Access Controls are implemented in any organization to increase the security. Type of access control vary according to situation and level of security needed. Two situations are given below and you have to identify the type of access control applied in each one of them.

    A) An organization wants each individual to provide some kind of distinctive physical characteristics to prove its identity. Without identification he/she will not be allowed to access different assets. (Physical + Logical)

    B) An organization is dealing with very critical information and it does not want its data to be disclosed to anyone especially during transmission. To avoid any exposure to intruders, organization wants to convert its data into secret code for the secure transmission over the public network.

    Question No. 2 3

    Different types of Computing Environments are used in different situations according to the requirements. Suppose a company wants high computing power and security along with flexibility, scalability and fault tolerance. For this purpose the company has deployed many computer systems at different locations and to do parallel computing. In your point of view, which computing environment will be suitable in this set-up?

    Question No. 3 2

    Which parts of a computer system are most vulnerable when it is attacked by some virus? Write names of at least four (4) parts.

  2. #2
    Senior Member Entboy's Avatar
    Join Date
    Dec 2011
    Posts
    5,454
    Vulnerability refers to several kind of security risks which include viruses, trojans, worms etc. It basically means that your compter may be prone to the attacks by viruses more easily. This can lead to destruction of data and stealing private data.

    Computers are vulnerable in several ways. You can ruin them with physical violence. You can ruin them by pouring liquids into them. They can be stolen. Computers can be hacked via network connections. I'm sure the list can be lengthened by more creative people.

  3. #3
    Senior Member
    Join Date
    Oct 2012
    Posts
    323
    A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

  4. #4
    Senior Member
    Join Date
    Oct 2012
    Posts
    323
    Vulnerability refers to several kind of security risks which include viruses, trojans, worms etc. It basically means that your compter may be prone to the attacks by viruses more easily. This can lead to destruction of data and stealing private data.Computers are vulnerable in several ways. You can ruin them with physical violence. You can ruin them by pouring liquids into them. They can be stolen. Computers can be hacked via network connections. I'm sure the list can be lengthened by more creative people.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. CS507 Information Systems Assignment 04 Spring 2014 Due Date 24th July 2014
    By education-2014 in forum Assignments & Solutions
    Replies: 0
    Last Post: 07-18-2014, 02:49 PM
  2. Replies: 0
    Last Post: 11-21-2012, 06:08 PM
  3. Replies: 0
    Last Post: 07-02-2012, 06:41 PM
  4. Replies: 7
    Last Post: 11-15-2011, 04:55 AM
  5. Replies: 0
    Last Post: 04-25-2011, 07:35 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft