Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 14, Problem 14.5E
Explanation of Solution
Protection of data with the use of defensive layers:
Systems with more defensive layers are more secure and if these layers work independently then better results can be derived. The defensive layers which are included in any
- User authentication:
- This layer is used to check that the particular user is authorized to access the desired data or not. Information system will be able to maintain system generated user ID and instantly generated password for security of data items...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Why is it critical to approach the creation of information systems using a systematic methodology? Please defend your response with any TWO of the following reasons:
To what extent can using a disjointed information system lead to difficulties and roadblocks?
When it comes to constructing an information system, it takes a concerted effort from end-users, managers, and analysts working together in an orderly fashion to determine what features are necessary and how effective each design is.
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Does the organization face challenges due to the variety of information systems in use? Is there anything that can be done about it?arrow_forwardThe procedures of establishing information systems and assessing them are two separate but linked activities that need to be carried out. Both of these processes are necessary.arrow_forwardIt is necessary to identify the fundamental components of an information system. What exactly is a mission-critical system, and how does it vary from a regular system in terms of reliability?arrow_forward
- It is necessary to adopt a systematic approach to the creation and deployment of information systems in order to reduce the total time needed.arrow_forwardExplain how all of the many components of an information system work together to build the whole. Where does this individual fall in the aforementioned hierarchy, and what purpose does he or she serve?arrow_forwardThe history of information systems should be examined, with particular emphasis on the major actors and events that paved the way.arrow_forward
- How can information system scope creep occur?arrow_forwardIt is possible that the findings of a literature review will be included into the strategy that is currently being used to construct a step-by-step plan for an information system.arrow_forwardGiven the fast evolution of information technology and industry, Do you feel that comprehensive information resource planning activities are necessary in these environments? is it beneficial for the majority of organizations? What are your reasons for or against? Under what conditions may They cannot possibly be?arrow_forward
- The structure of an information technology system might be improved with the assistance of audits and accountability. Please provide an example, if it is at all possible to do so.arrow_forwardIt is very necessary to do research into the history of information systems, and it is especially vital to pay close attention to the innovators who paved the way.arrow_forwardIt is important to determine the fundamental components that make up an information system. What exactly is meant by the term "mission-critical system," and how does this kind of setup vary from a typical one?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning