Suppose a program to print paychecks secretly leaks a list of names of employees earning more than a certain amount each month. What controls could be instituted to limit the vulnerability of this leakage?
What will be an ideal response?
Example
controls:
Screening
all
output;
splitting
the
program
into
two,
written
by
separate
teams,
each
processing
half
of
the
input
each
month;
code
reviews
during
development;
testing
to
exercise
all
branches
in
the
source
code.
Note
that
these
controls
are
not
perfect.
Note
also
that
it
is
much
easier
to
limit
the
vulnerability
if
one
knows
or
suspects
it
exists
instead
of
hypothesizing
such
a
vulnerability
exists
and
seeking
to
confirm
the
hypothesis.
You might also like to view...
The ___________ function allows characters of one part of a string to be copied into another, overlapping part of the same string.
a. memchr b. memcmp c. memcpy d. memmove
If an exception is thrown in C++, it may be because:
A. there was not enough heap memory to satisfy a new operation B. the compiler found the code to be exceptionally confusing C. an exception catcher is ready to catch it D. the exception, being confined to an addressable location, was recently released by a faulty exception clause
In a transaction processing cycle, capturing data at its source and recording it accurately in a timely fashion with minimal manual effort and in an electronic or digital form so that it canĀ be directly entered into the computerĀ is known as _____.
Fill in the blank(s) with the appropriate word(s).
A Microsoft Excel file has the extension ____.
A. .docx B. .xlsx C. .jpg D. .mp3