SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
William Stallings
Chapter:
Computer And Network Security Concepts
Exercise:
Problems
Question:3 | ISBN:9781292158587 | Edition: 7

Question

Consider a financial report publishing system used to produce reports for various organizations.
a. Give an example of a type of publication in which confidentiality of the stored data is the most important requirement.
b. Give an example of a type of publication in which data integrity is the most important requirement.
c. Give an example in which system availability is the most important requirement.

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

a)  You can take health care institutions and financial organizations are good examples where confidentiality of information is important (and it wouldn’t go wrong any company you take, data confidentiality holds a degree of importance for any company)

 

For example, in a hospital, keeping the records of HIV patience holds a certain degree of importance. Leaking of particular information will cause social and psychological impacts on the patient.

 

So, in the above case, the confidentiality of stored records of the patient is the most important requirement.

 

b) Let’s take the pharmaceutical industry where someone discovered a drug for cancer and sent information for the production, but the whole production was stopped due to missing critical information in the documentation. This is due to failure to keep the integrity of data. 

             

In the above case, the integrity of data is of utmost importance.

 

c)  When a user tries to access critical information from a website or system, but it’s not available for the intended user, because some malicious person or attacker load the server with fake user traffic. The server can’t recognize the fake user and its intended user. So it causes denial of service for the intended user.  

0 0

Discussions

Post the discussion to improve the above solution.