Professional Documents
Culture Documents
Discuss The Issues That Need To Be Considered Before Implementing Keystroke Monitoring
Discuss The Issues That Need To Be Considered Before Implementing Keystroke Monitoring
Discuss The Issues That Need To Be Considered Before Implementing Keystroke Monitoring
REVIEW QUESTIONS
2. What are the three main tasks the operating system performs?
4. What are the four techniques that a virus could use to infect a system?
DISCUSSION QUESTIONS
1. Why is human behavior considered one of the biggest potential threats to operating
system integrity?
.2. Why would a systems programmer create a back door if he or she has access to the
program in his or her day-to-day tasks.
4. Explain how an access token and an access control list are used to approve or deny
access.
PROBLEMS
1. Network Access Control
Ajax Automotive services retail automotive centers the east coast by supplying them with
quality car and truck parts such as brake pads, oil filters, water pumps, etc. The
company’s 123 sales representatives work exclusively in the field visiting client company
locations and submitting sales orders from laptop computers via an internet connection to
the corporate offices in Delaware. All of Ajax’s sales orders are received in this manner.
Customer account, sales history, inventory, and cash receipts records are stored on a
central server at the corporate site. Customers are billed digitally from the corporate
office on a net 30 basis.
Required;
Outline the access controls that would be appropriate for this situation. Explain why these
controls are necessary.