Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 6, Problem 6.16CS6

Explanation of Solution

Analyzing Security Exchange Commission’s (SEC) view:

  • A storage system uses an integrated software/hardware codes provides a supportable rule regarding the storage of records in non-rewriteable and non-erasable state in retention length.
  • But it is essential to store the records in permanent retention period instead of placing retention period.
  • According to the SEC, their position is difficult to alter a system which combines both integrated hardware and software controls than it is to interfere with a system which has the software applications contains password protected authentications.
  • The main role of the SEC is to ensure that there is no record alterations have been made to the system for assuring 100% accuracy...

Blurred answer
Students have asked these similar questions
One common description of the security issue (from the perspective of the defender) is the preservation of the confidentiality, integrity, and availability of data (and services). From the attacker's point of view, it is possible to conceive about interruption, interception, modification, and creation in many ways. Is there any relationship between the last four ideas and the first three concepts mentioned? Is there a match-up between any of the four and any of the other three players? If so, does one or more of the four include at least one of the three? Is there anything that comes within the purview of one formulation but not the other, and vice versa? Which framework is more advantageous, and why is this so?
Do you believe that unauthorised individuals were responsible for the most recent security breach that included access control and authentication and was reported in the news? Is there any indication that it has had any kind of an impact on the way that day-to-day activities are carried out? How much cash has been squandered by the company?
Therefore, what is the intended objective of implementing this requirement for authentication? It is pertinent to evaluate the benefits and drawbacks of the diverse array of verification methodologies that exist in contemporary times.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning