Question: System Security and Accessibility Once a system is implemented, the issues of system security and accessibility become critical considerations. Hackers have compromised the security of
System Security and Accessibility
Once a system is implemented, the issues of system security and accessibility become critical considerations. Hackers have compromised the security of systems from Granddads PC to government servers containing the top secrets of the worlds superpowers. From hard-to-remember passwords to one-time codes, organizations have demanded security be enforced and the identity of the user be verified.
In addition to the need to secure our computers from genius-level hackers with malevolent intent, modern computer systems must be designed to be accessible by users with a variety of disabilities that may limit their ability to interact with computers without some modification to the interface. There are numerous tools available to support computer access for individuals with a wide range of disabilities. One famous user with ingenious assistive tools was the renowned English physicist Dr. Stephen Hawking, who suffered from ALS and used a thumb switch and his cheek muscles to control his computer and communicate with people. That was an amazing example of computer accessibility.
To Prepare for This Discussion
- Conduct research on best practices for creating a secure and accessible environment for new systems being implemented within organizations today.
- Describe and assess the benefits of at least two security options to be included in the implementation plan. Justify your response.
- Describe and assess the benefits of at least two accessibility options for users with disabilities to be included in the implementation plan. Justify your response.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
