The stakeholders of a software company have four new security requirements that they are considering including in the next release of their flagship product: Two-factor authentication (2FA), Captcha for Bot Detection (CBT), Password Expirations (PEX), and Role-base access control (RBA).
Given the time constraints, they may not be able to include all, so they need to prioritize these requirements based on three criteria: Maintainability (MA), Ease of Use (EU), and Integration Support (IS). They have the following pairwise preferences of the criteria:
- Maintainability is three times as important as Ease of Use
- Ease of Use is two times as important as Integration Support
- Maintainability is five times as important as Integration Support
Based on the above information, do the following:
- Rank the four security requirements using the criteria weights and the following alternatives matrix:
MA |
EU |
IS |
|
2FA |
0.36 |
0.29 |
0.09 |
CBT |
0.13 |
0.33 |
0.18 |
PEX |
0.27 |
0.21 |
0.40 |
RBA |
0.24 |
0.17 |
0.33 |
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps with 5 images
- The suggested solution should address IT security issues alone.arrow_forwardIn this article, we'll examine four distinct logical security methods that, if put into place, would provide the system security administrator more leeway.arrow_forwardExplain how each concept leads to the construction of security mechanisms that may be used to accomplish desired enterprise security policies.arrow_forward
- The system security administrator's degree of control may be increased by adopting four logical security strategies. The administrator would have greater control over the system with these precautions.arrow_forwardThe majority of individuals concur that creating proper security rules and consistently implementing them are necessary actions to take. An explanation of why creating, implementing, and maintaining security rules is so important.arrow_forwardWe'll look at four logical security strategies that provide system security administrators more power. These precautions would provide the administrator additional system control.arrow_forward
- John Martin, a highly skilled computer technician with a master's degree in computer science took a low profile evening job as a janitor at Kent Manufacturing Company. Since the position was low level no security clearance or background check was necessary. While working at nights, John snooped through offices for confidential information regarding system operations, internal controls, and the financial thresholds for trans-action that would trigger special reviews. He observed employees who were working late, type in their passwords, and managed to install a Trojan horse virus onto the system to capture the IDs and passwords of other employees. During the course of several weeks, john obtained the necessary IDs and passwords to set himself up in the system as a supplier, a customer, systems administrator, which gave him access to most of the accounting system’s functions. As a customer, John ordered inventory that was shipped to a rented building and later sold. As a system…arrow_forward6. What is it and how are misuse or abuse cases help security engineers design measures to protect a system from specific threats?arrow_forwardDescribe how each idea contributes to the creation of security tools that may be used to implement desired security standards in enterprises.arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY