introduced an example of an equity trading system that handles purchases and sales of stocks and shares. Two possible cyberattacks that might affect this system are (1) an unauthorised user places malicious orders to move prices and (2) an intrusion that corrupts the database of transactions that have taken place. For each of these cyberattacks, identify resistance, recognition and recovery strategies that might be used.

What will be an ideal response?


Unauthorized user places malicious orders to move prices
Resistance: Require those placing orders to be registered with the system. Limit
the number of orders placed per second. Track price changes and include alert
when these are greater than a certain amount. Keep a timestamped log of all
transactions and a log of all price changes.
Recognition: Compare stock prices with prices from other market makers. Relate
order times to times of price changes to detect orders affected.
Recovery: Delay payments and allow transactions in affected stocks to be
cancelled. Unwind changes to stock price database for affected stocks.
Corruption of database by an intruder
Resistance: Maintain log of all transactions. Maintain backup copy of database.
Scan database checking for corrupts and damaged records.
Recognition: Failed transactions and failed access to database records.
Recovery: Restore database from database backup + transaction log

Computer Science & Information Technology

You might also like to view...

Identify the correct answer from the list of choices.

A. A protocol that encrypts data B. A P2P file sharing protocol C. Search site that uses Yahoo's search engine D. The Web operates according to the standards E. A programming and scripting language

Computer Science & Information Technology

COGNITIVE ASSESSMENT When a user types data on a keyboard, what is occurring?

A. The user is using an input device to enter input into the memory of the computer. B. The user is issuing a command that is stored in the memory of the computer and then is transformed into input data for use with a program. C. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and how to perform them. D. The user is entering information that will be transferred to the CPU for interpretation and then to storage so that the information will be available when needed.

Computer Science & Information Technology

________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

A. Do not track B. Private browsing C. Automation D. Anonymity

Computer Science & Information Technology

Compare the two forms of port mirroring: local and remote.

What will be an ideal response?

Computer Science & Information Technology