Read the following scenario and suggest measures that could be taken to improve the security of the computer system.
A Computer Science student has a summer job in the data processing department of a large supermarket.
One lunchtime he is left alone in the office which he shares with several other employees. He sits down at a colleague’s desk and finds that the PC is still logged on. He browses the menu and comes upon a menu to access the product database.
The submenu asks if he would like to Add, Delete, Update or View products. He selects Update and changes the price of several items that he wishes to purchase. Then he leaves the office and goes and makes his purchases, before returning and restoring the database to its original state. How could his actions be discovered?
Security measures
These goals form the confidentiality, integrity, availability (CIA) triad, the basis of all security programs.
The CIA is a security model that is designed to act as a guide for information security policies within the premises of an organization or company. The CIA criteria are one that most of the organizations and companies use in instances where they have installed a new application, creates a database or when guaranteeing access to some data. For data to be completely secure, all of these security goals must come to effect. These are security policies that all work together and therefore it can be wrong to overlook one policy.
Comments
Leave a comment