Software Engineering (10th Edition)
Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 14, Problem 14.5E

Explanation of Solution

Protection of data with the use of defensive layers:

Systems with more defensive layers are more secure and if these layers work independently then better results can be derived. The defensive layers which are included in any information system for maintaining better security of data items are mentioned below:

  • User authentication:
  • This layer is used to check that the particular user is authorized to access the desired data or not. Information system will be able to maintain system generated user ID and instantly generated password for security of data items...

Blurred answer
Students have asked these similar questions
Why is it critical to approach the creation of information systems using a systematic methodology? Please defend your response with any TWO of the following reasons:
To what extent can using a disjointed information system lead to difficulties and roadblocks?
When it comes to constructing an information system, it takes a concerted effort from end-users, managers, and analysts working together in an orderly fashion to determine what features are necessary and how effective each design is.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning