Answered step by step
Verified Expert Solution
Question
1 Approved Answer
3. Violations of Security Principles In the table below, complete the entries in the second column by identifying the security principle that is violated by
3. Violations of Security Principles In the table below, complete the entries in the second column by identifying the security principle that is violated by each scenario. Violated Security Principle Scenario The office secretary acquires a virus that is. able to reconfigure her computer because she always logs in with an administrator account. It is discovered that the project leader overpriced purchased equipment and was also getting money on the side from the vendor. The kiosk in the lobby is used to visit web sites other than the company directory and map. John is fired, but his employer soon discovers he was the only one who knew how to configure the firewalls. A network is easily taken down by the attackers once they get past the company's only real defense, which is a firewall. A vulnerability in the Cisco routers is published on the Internet. The company only uses Cisco routers. Hackers discover a "hidden" web site featuring the company directory with confidential information on it. Hackers attempting to break into a computer acting as a mail server are unsuccessful. They discover that the same server also has a web server service on it and are able to break into the server that way. NOTE: You answers can either be type-written or can be written in ink. Upload a properly readable scanned copy of the assignment to blackboard (.docx or .pdf file)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started