Preview

Kizza Chapter *

Satisfactory Essays
Open Document
Open Document
528 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kizza Chapter *
Chapter Number and Title:Chapter 8-Software Issues: Risks and Liabilities (202-237) | Your Name: | Today's date: February 7, 2013 | | 1. Briefly state the main idea of this chapter. Since software in one form or another controls every computer or computer component, it becomes a more important and fundamental part of our life. Even though we may not understand the languages that make up the software, we must be aware of the elements of software that affect its use. Verification and Validation, reliability, security, safety, and quality are some of the major points examined and brought to light. It delves into the various reasons of why software fails and who is responsible. More importantly, it covers what consumer protection exists and the rights of software buyer's. | 2. List three important facts that the author uses to support the main idea: A. Verification and Validation involves static formal mathematical techniques such as proof of correctness and dynamic techniques such as testing to show consistency between the code and the basic initial specifications. B. Consumer protection consists of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. C. Software is an integral part of a computer system and the security of such a system depends on its hardware but even more so on the software component. There are more security attacks on systems through software “holes” than hardware, mainly through piracy, deletion and alteration of programs and data. | 3. What information or ideas discussed in this chapter are also discussed in readings from DePalma? List the Unit and Title(s) of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Computers systems are an essential piece of equipment in many people’s everyday lives they have to deal with a lot of processes information and be able to go on the internet where there is a risk of getting viruses and bugs. This is why computer systems have to be equipped with the right software utilities to ensure that they are working at their best at all times. There are many different types of software utilities available for a computer system I will explain them in detail in this report.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    chapter

    • 1399 Words
    • 6 Pages

    "Papas, she said, it still is your day. You aren't dead yet, are you? Anyway, the goat is fond of you.'…

    • 1399 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Software developers make effective software. It is an engineering endeavor that cannot be extracted from the context and systems with which it interoperates. The heart of a good software solution is not in turning the functional specification into code but rather in the use of available resources such as time and money to create desired outcomes for stakeholders, while satisfying constraints such as legal requirements through purposeful design.…

    • 1334 Words
    • 6 Pages
    Good Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Society has come to expect certain protection and securities in software. The control of personal information is of great importance not only for businesses but also for consumers who employ the same software at home. When software first made an appearance in the 1950’s, internet was not of the global use seen today (Kubie, 1994). The rise of internet changed how the world communicated and how companies did business.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 436 Words
    • 2 Pages

    3. What information or ideas discussed in this chapter are also discussed in readings from Annual Editions?…

    • 436 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Chapter 02

    • 1790 Words
    • 7 Pages

    Fiscal policies refer to government efforts to influence the economy through taxation without representation and spending decisions that are designed to encourage growth. Monetary policies refer to actions that shape the economy by influencing interest rates and the supply of money. Politics plays a role by making taxes higher and by influencing interest rates.…

    • 1790 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Application Layer Security

    • 3346 Words
    • 14 Pages

    Abstract The purpose of this paper is to identify common application layer security holes, describe common fixes of these problems and discuss the importance of application layer security in development of software. This paper will also discuss common practices for securing applications. The three main aspects of information security include: confidentiality, integrity and availability. These aspects of data security are at risk by three main categories of vulnerabilities that will be discussed in this paper. They are design vulnerabilities, development vulnerabilities, and deployment vulnerabilities. In beginning my research on this topic I anticipated learning about encryption on and authentication on software applications, but as the paper indicates those are only a small part of security. Acknowledgments I would like to thank and acknowledge Ms. Edie Dille from York Technical College for the use of her presentation on the OSI Model, Dr. Garrison from Winthrop University for the opportunity to research software security and Ms. Valerie Chantry from MassMutual for access to Symantec security documents and presentations. Background The OSI (Open Systems Interconnect) model is a reference model for how data should be transmitted between any two devices in a network. It was developed to guide implementers in standardizing their products so that communications can occur between different bands of equipment, different protocols, different media types, and different operating systems. The OSI model simplifies the networking process for…

    • 3346 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Role Mining - Revealing Business Roles for Security Administration using Data Mining Technology Martin Kuhlmann Dalia Shohat SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 D 50858 Cologne [martin.kuhlmann|dalia.shohat] @systorsecurity.com Gerhard Schimpf SMF TEAM IT-Security Consulting Am Waldweg 23 D 75173 Pforzheim Gerhard.Schimpf@smfteam.de ABSTRACT In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns.…

    • 5822 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Chapter

    • 4579 Words
    • 16 Pages

    Members vowed excel in intellectual and physical prowess in order to gain the admiration of foreigners, especially Spaniards.…

    • 4579 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    I.T PPT

    • 256 Words
    • 2 Pages

    Safety is an emergent property of whole systems; software may play only a small part.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays