Critical Measures

Improved Essays
In Table 2, the advantages and disadvantages of the three critical measures to protect operating systems, including their specific examples are hereby provided. Most of the disadvantages pertain to costs, time and efforts upon implementation of the critical measures for system protection and security. Moreover, there are no absolute solutions for cyber-attacks, intrusion and hi-jacking of systems and information, except that prevention can substantially reduce these occurrences (Silberschatz, et al., 2005, p. 604). Thus, it is critical that these measures are implemented in order to prevent potential losses and the encumbrance of high and costly system damages.
Table 2: Advantages and Disadvantages of Critical Measures used Protecting Operating
…show more content…
1.1.1 Smart card technologies The need to verify the identity of user every day is remedied; it can also monitor conveniently the location or “whereabouts” of a certain user or individual; “Access changes” can be done with ease upon employee’s termination / resignation and badge loss; It can also limit the number of password for each user and access system;
It can result to work efficiency through less work hours in resetting passwords and “locked out systems” (Wees, 2012). Costly and also prone to replication of smart cards that can result in authorized system access (Wees, 2012)
2 Access control Limit user’s access to data, applications, communication, networks and system after the identification and authentication process
(Wees, 2012); Protect systems against internal and external
…show more content…
Unsolicited files or documents must not be uploaded (Belthoff, 2003) Need cost, time and effort for regular system maintenance, monitoring and security procedures; Employee training and the use of software applications for internal audit / assessment can be costly and
“extensive” (Kakareka, as cited in Wees, 2012). Cited in: Kent & Steiner, 2012, p. 5; Belthoff, 2003; Wees,

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ethical Man Month Essay

    • 637 Words
    • 3 Pages

    Question 1: Using The Mythical Man Month reading found on the course homepage, read the project problems mentioned in the text. List the difficulties and errors that occurred in these failed programming projects. In the Mythical Man reading the difficulties and errors that occurred include;  Time complexity  As input increases, Output decreases  Communication Barriers  High cost…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Single-Sign-On Case Study

    • 892 Words
    • 4 Pages

    Some sophisticated smart cards contain hardware-based encryption chips that can provide better throughput than software-based implementations. A smart card can also store a username while the Kerberos-based SSO cannot store the username. The smartcard can be access from any workstation. Users log in by inserting the smart card in a hardware device that reads the card and prompts the user for whatever authentication information the card requires, such as a PIN.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Critical Risk Assessment

    • 1077 Words
    • 5 Pages

    5 - Critical Risk Assessment 5.1 Risk: Lack of Funding There is a high probability of a lack of funding for the Observation Tower. The impact that a lack of funding would have on the project would prevent, or delay, construction of the tower. However, a lack of funding for the tower is not critical to the other projects, except possibly the Trail Team.…

    • 1077 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Proposal for Security Software Name: Jamonte Reed Institution: University of Maryland University College Proposal for Security Software Owing to the cybercrimes threats attempted on Advanced Research Company, it is recommended that the executive should make plans to acquire security software that will protect confidential corporate data from external access. Past events have demonstrated that companies are not secure from cyber attacks owing to the ones that the company has experienced and the recent one that involved a major competitor. In this study, attention is accorded to a description of the recommended security software and its benefits to the company.…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The following is a list and brief detailing of the organizations current risks. These threats are generalized there is a specific list of threats to the embassy listed later. Risks and Challenges Acts of Nature Include Lightening storms, hail storms, tornado’s earthquakes floods or any other natural disaster you could think of that could possibly disrupt daily operations and make data unavailable for any reasons.…

    • 1006 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Argumentative Article Essay In “Step aside, Windows! Open source and Linux are IT’s new security headache,” Preston Gralla is examining how hackers are beginning to target open source softwares more than in the past. Gralla points out that Windows is still the primary target of attacks, “nearly 99% of them targeted Windows” but also argues that open source software attacks are on the rise. Gralla provides an ample amount of credible information to back his claims.…

    • 826 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays