Discuss three sources of exposure (threats) to the operating system
1 . Privileged personnel who abuse their authority. Systems administrators and systems programmers require unlimited access to the operating system to perform maintenance and to recover from system failures. Such individuals may use this authority to access users' programs and data files.
2 . Individuals both internal and external to the organization who browse the operating system to identify and exploit security flaws.
3 . Individuals who intentionally (or accidentally) insert computer viruses or other forms of destructive programs into the operating system.
You might also like to view...
When a theater sells matinee movie tickets at low prices, it aims to shift some demand from the peak to the off-peak period. What is the strategy that the theater is said to be adopting?
A) It is providing complementary services. B) It is increasing peak-time efficiency. C) It is using linear pricing. D) It is using differential pricing. E) It is sharing services.
________ of fieldwork means verifying that field workers are submitting authentic interviews
A) Verification B) Validation C) Pretesting D) Coding E) Selection
Work-in-process inventory is devoted to maintenance, repair, and operating materials
Indicate whether the statement is true or false
In a price-break model of lot sizing, to find the lowest-cost order quantity, it is sometimes necessary to calculate the economic order quantity for each possible price.
Answer the following statement true (T) or false (F)