Answered step by step
Verified Expert Solution
Question
1 Approved Answer
I need help with this Assume that you are working on an online shipping system (similar to fedex.com). You have collected the requirements for the
I need help with this
Assume that you are working on an online shipping system (similar to fedex.com). You have collected the requirements for the system and now you are working on documenting those requirements.
Specify three examples of security requirements similar to the example below
Type of Requirement System Value Estimates Definition Examples . The system is not mission critical, but a sys- Estimated business value of the system and its data tem outage is estimated to cost $50,000 per hour in lost revenue. . A complete loss of all system data is esti- mated to cost $20 million. Access Control Requirements Limitations on who can access what data . Only department managers will be able to change inventory items within their own department . Telephone operators will be able to read and create items in the customer file but cannot change or delete items. puter to website to provide secure ordering. be required to authenticate. viruses before being saved in the system. Defines what data will be encrypted Where Data will be encrypted from the user's com- Encryption and the Authentication and whether authentication will be needed for user access Requirements . Users logging in from outside the office will Virus Control Requirements to control the spread . All uploaded files will be checked for Requirements of viruses FIGURE 11-16 Security RequirementsStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started