Discuss three sources of exposure (threats) to the operating system


1 . Privileged personnel who abuse their authority. Systems administrators and systems programmers require unlimited access to the operating system to perform maintenance and to recover from system failures. Such individuals may use this authority to access users' programs and data files.
2 . Individuals both internal and external to the organization who browse the operating system to identify and exploit security flaws.
3 . Individuals who intentionally (or accidentally) insert computer viruses or other forms of destructive programs into the operating system.

Business

You might also like to view...

When a theater sells matinee movie tickets at low prices, it aims to shift some demand from the peak to the off-peak period. What is the strategy that the theater is said to be adopting?

A) It is providing complementary services. B) It is increasing peak-time efficiency. C) It is using linear pricing. D) It is using differential pricing. E) It is sharing services.

Business

________ of fieldwork means verifying that field workers are submitting authentic interviews

A) Verification B) Validation C) Pretesting D) Coding E) Selection

Business

Work-in-process inventory is devoted to maintenance, repair, and operating materials

Indicate whether the statement is true or false

Business

In a price-break model of lot sizing, to find the lowest-cost order quantity, it is sometimes necessary to calculate the economic order quantity for each possible price.

Answer the following statement true (T) or false (F)

Business