Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Consider an e-commerce Web site that normally runs seven days a week, 24 hours a day, generating an average of $10,000 per hour in revenue from customer orders. Experience has shown that:
- the site becomes unavailable due to operating systems failure five times a week.
- At each
- In addition, the company estimates that upon a failure, it would spend $5,000 on advertising to counteract the negative publicity from such an incident.
Calculate SLE, ARO and ALE (Show the calculation).
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Describe a case in which a user has a major problem due to the complete denial of a service (that is, the user receives no answer from the computer).Describe another case in which a 10% denial of service (the user's calculation advances, but at a 10% slower rate than usual) is a severe issue for that user.Could unlawful access to a computing system result in a 10% denial of service to legitimate users?If so, how so?arrow_forwardDenial of Service attacks are estimated to happen once every six months (twice a year) in a mid-size company. One such company, XYZ, estimates the cost of recovering from a single DoS attack to be $12000. The company decides to apply a number of controls to counter these attacks. With these controls, the frequency of successful DoS attacks against the company reduces to once a year and the cost of recovering from an instance becomes $8000. The cost of implementing these controls is $7,000 a year. From a purely financial point of view, is it worth for the company to implement these controls? Calculate the prior and post ALE and do a cost-benefit analysis to answer the question. In your answer make sure that you indicate what ARO, SLE and ALE are with and without controls. State clearly whether the company should implement the controls and explain why.arrow_forwardRespond to the following in a minimum of 175 words: Discuss a cryptography attack scenario. Choose an attack and explain how it works. Be sure to choose one that hasn’t been mentioned by another classmate. What countermeasures would you apply? How do the countermeasures you would use compare to those your classmates recommended for the attacks they chose? What do those similarities or differences tell you about fighting these types of attacks?arrow_forward
- One of the most basic concepts in the field of Information Security is the CIA Triad or CIA Triangle. This was mentioned briefly in Chapter 1 of your text. CIA stands for Confidentiality, Integrity, and Availability. Denial of Service (DoS) attacks challenge the "Availability" of a system or data. This could be temporary (e.g., a SYN Flood Attack that renders a web server unavailable during the attack) or permanent (e.g., the deletion or destruction of the data). The latter of these has become increasingly common in the case of "ransomware" which is malware that encrypts all of the data on an infected system and the administrator is notified that if they don't pay a ransom by a certain date that the key to decrypt the data will be permanently deleted. (NOTE: This is conspicuously absent from the books discussion on malware but is a MAJOR issue right now.) While the temporary attacks may be less destructive, they are often done against systems that generate a lot of money (such…arrow_forwardImagine a software that enables a surgeon to operate remotely on a patient who is in another country using just the internet. Why would anybody want to remain after the lights are out? How potentially damaging do they anticipate it to be? Which of your shortcomings do you believe they would highlight in an effort to cast doubt on you? Is it conceivable for harm to occur when there isn't a violent attacker there to exploit these vulnerabilities?arrow_forwardDescribe a situation in which a user's complete denial of a service (i.e., the user gets no response from the computer) is a significant problem. Describe another case in which a 10% denial of service (i.e., the user's calculation proceeds at a 10% slower pace than normal) is a major problem. Is it possible that unauthorised access to a computer system will result in a ten percent service denial for legitimate users? How would you go about accomplishing that if that's the case?arrow_forward
- DDoS attacks have been used as a distraction for other activities, using the web, can you explain a scenario where DDoS attack was simply a distraction? What were the goals of the attacker in your scenario?arrow_forwardWhen someone tosses a quantity of poison at another person, they are committing what is known as a "poison packet assault." You are able to offer two different illustrations of this specific form of assault.arrow_forwardSubject: Software Engineering An ATM’s PIN entry screen has been designed to display a warning message if the user pushes the submit button before entering a digit in each of four required fields. This is an example of: a)H-C-I. b)Anattempt to increase SA. c)Defensivedesign. d)Securityengineering. e)All ofthe above. What does the Lexington Airport Crash case tell us about Team SA: a)TeamSA requires an unambiguous definition of who is on which team. b)TeamSA is impacted by both H-H-I and H-C-I. c)TeamSA is highest early in the day. d)TeamSA involves runtime binding. e)Noneof the above.arrow_forward
- Distributed denial of service attacks occur when several users attempt to overload a website at the same time. I can't see how one individual could possibly manage all of this.arrow_forwardA legitimate software distributor in another country is making copies of the manufacturer’s software with a fake label. They sell it cheaper than the manufacturer’s brand. The distributor resides in a country that doesn’t honor copyright laws. What are the distributor’s actions in that country? A) violates agreement B) illegal C) legal D)unethicalarrow_forwardInternet usage for free expression is growing. Several people and organisations spread hatred on Facebook and Twitter. Given the medium, should online speech be unrestricted? Should social media ban hate speech?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education