Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I need help with this Assume that you are working on an online shipping system (similar to fedex.com). You have collected the requirements for the

I need help with this

Assume that you are working on an online shipping system (similar to fedex.com). You have collected the requirements for the system and now you are working on documenting those requirements.

Specify three examples of security requirements similar to the example below

image text in transcribed

Type of Requirement System Value Estimates Definition Examples . The system is not mission critical, but a sys- Estimated business value of the system and its data tem outage is estimated to cost $50,000 per hour in lost revenue. . A complete loss of all system data is esti- mated to cost $20 million. Access Control Requirements Limitations on who can access what data . Only department managers will be able to change inventory items within their own department . Telephone operators will be able to read and create items in the customer file but cannot change or delete items. puter to website to provide secure ordering. be required to authenticate. viruses before being saved in the system. Defines what data will be encrypted Where Data will be encrypted from the user's com- Encryption and the Authentication and whether authentication will be needed for user access Requirements . Users logging in from outside the office will Virus Control Requirements to control the spread . All uploaded files will be checked for Requirements of viruses FIGURE 11-16 Security Requirements

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Security

Authors: Alfred Basta, Melissa Zgola

1st Edition

1435453905, 978-1435453906

Students also viewed these Databases questions

Question

What is DDL?

Answered: 1 week ago