Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3. Violations of Security Principles In the table below, complete the entries in the second column by identifying the security principle that is violated by

image text in transcribed

3. Violations of Security Principles In the table below, complete the entries in the second column by identifying the security principle that is violated by each scenario. Violated Security Principle Scenario The office secretary acquires a virus that is. able to reconfigure her computer because she always logs in with an administrator account. It is discovered that the project leader overpriced purchased equipment and was also getting money on the side from the vendor. The kiosk in the lobby is used to visit web sites other than the company directory and map. John is fired, but his employer soon discovers he was the only one who knew how to configure the firewalls. A network is easily taken down by the attackers once they get past the company's only real defense, which is a firewall. A vulnerability in the Cisco routers is published on the Internet. The company only uses Cisco routers. Hackers discover a "hidden" web site featuring the company directory with confidential information on it. Hackers attempting to break into a computer acting as a mail server are unsuccessful. They discover that the same server also has a web server service on it and are able to break into the server that way. NOTE: You answers can either be type-written or can be written in ink. Upload a properly readable scanned copy of the assignment to blackboard (.docx or .pdf file)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Why are accounting assumptions necessary?

Answered: 1 week ago

Question

Identify cultural barriers to communication.

Answered: 1 week ago