Create an Account

Already have account?

Forgot Your Password ?

Home / Questions / Listed here are four scenarios For each scenario discuss the potential consequences and gi...

Listed here are four scenarios For each scenario discuss the potential consequences and give a prevention technique A company has recently installed a new computer network

Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. A) A company has recently installed a new computer network. The operating philosophy adopted by new network administrator was to establish an open system that would foster work group data sharing, flexible access, and minimal inconvenience to the network users. To accomplish this objective the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. B) Mary is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during that three week period. Two weeks later Mary created a logic bomb designed to activate three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. C. Robert discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at home, which he also used at his office when connecting to the company’s network. The program contained a virus that spread to the company’s mainframe. D. Murray, a trusted employee and a systems engineer, had access to both the network access control list and user passwords. The firm’s competitor recently hired him for a large increase in salary. After leaving, Murray continued to browse through his old employe

Apr 25 2020 View more View Less

Answer (Solved)

question Subscribe To Get Solution

Related Questions