Question: please solve correct full 3 questions and don't copy paste from AI tools otherwise dislike, make everything clear thank you A company has three major

please solve correct full 3 questions and don't copy paste from AI tools otherwise dislike, make everything clear thank you

please solve correct full 3 questions and don't copy paste from AI

A company has three major divisions, headquarters (HQ), factory (F) and a retail outlet (R), at three different sites. They all have connection to the public Internet, and to save money, the company has decided to rely on public infrastructure to connect the sites. The retail outlet also has an on-line department that sells products via a Webbased e-shop, which can have very heavy traffic at peak times. The e-shop has to be able to cope with the peak traffic without fail, even when it is too much for a single host. All sites must be protected from attacks by those who want to disrupt the company's e-business. The e-shop should make sure that the ordered item is in stock or will be manufactured by the given date. To do that, it uses software components that can read the factory stock levels maintained (written) at the factory site. If the ordered item is not available, the e-shop must submit a request to the HQ, and the HQ then will schedule the production of the item and send the production schedule to the factory. To improve security, data exchange between sites is permitted only for the above listed operations. In a group of maximum 3 students: - List the main assets the company have, and indicate the level of importance of the assets (high, moderate, and low) with regards to the CIA triad. (2 marks) - Identify the subjects and objects for access control, indicate the access rights needed, and draw the access control Metrix. (2 marks) - Give an example of one threat that the company assets can faces and explain the harm it can cause. (1 mark) A company has three major divisions, headquarters (HQ), factory (F) and a retail outlet (R), at three different sites. They all have connection to the public Internet, and to save money, the company has decided to rely on public infrastructure to connect the sites. The retail outlet also has an on-line department that sells products via a Webbased e-shop, which can have very heavy traffic at peak times. The e-shop has to be able to cope with the peak traffic without fail, even when it is too much for a single host. All sites must be protected from attacks by those who want to disrupt the company's e-business. The e-shop should make sure that the ordered item is in stock or will be manufactured by the given date. To do that, it uses software components that can read the factory stock levels maintained (written) at the factory site. If the ordered item is not available, the e-shop must submit a request to the HQ, and the HQ then will schedule the production of the item and send the production schedule to the factory. To improve security, data exchange between sites is permitted only for the above listed operations. In a group of maximum 3 students: - List the main assets the company have, and indicate the level of importance of the assets (high, moderate, and low) with regards to the CIA triad. (2 marks) - Identify the subjects and objects for access control, indicate the access rights needed, and draw the access control Metrix. (2 marks) - Give an example of one threat that the company assets can faces and explain the harm it can cause. (1 mark)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!