Software Engineering (10th Edition)
Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 13, Problem 13.7E

Explanation of Solution

Attacks on equity trading system:

In the equity trading systems, user accounts and equity prices are replicated across servers so that orders can be placed making use of user account database, a price database and an order transaction database.

Some of the attacks that can happen to equity trading system and the stratergies to counter them are:

  • Attack in which a malicious user gains access to the system using accredited user credentials and then malicious orders are placed and stock is bought and sold.

    The strategy to counter attack is mentioned below:

    • Resistance: In order to place an order a dealing password is required which must be different from login password.
    • Recognition: One can send a copy of order by email to authorized user with contact phone number and maintain user’s order history and unusual trading patterns...

Blurred answer
Students have asked these similar questions
Create a BPMN model (2) (Business layer) of the following Business scenario: The company’s sales department receives an order from a buyer, while the finance department checks the buyer’s credit, and sends him/her an invoice when the order is fulfilled by the warehouse department. The order is considered complete if the buyer’s credit is sufficient, or the goods are in stock, otherwise the order fails, and the invoice isn’t sent. To fulfill the order, the warehouse department checks the availability of the order in the stock then allows to pick and then ship the order if it is available otherwise it is considered out of stock. In either case, the invoice is sent, and the order is considered complete, otherwise the order is failed.
Create any four scenarios that could possibly lead to deadlock
Denial of Service attacks are estimated to happen once every six months (twice a year) in a mid-size company. One such company, XYZ, estimates the cost of recovering from a single DoS attack to be $12000. The company decides to apply a number of controls to counter these attacks. With these controls, the frequency of successful DoS attacks against the company reduces to once a year and the cost of recovering from an instance becomes $8000. The cost of implementing these controls is $7,000 a year. The annual loss expectancy (ALE) without controls is $ A . The annual loss expectancy (ALE) with controls is $
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,