Você está na página 1de 6

Group 2

Problem Identification and Explanation

1. Data loss and destruction


2. Minimal security to data and its vulnerability to unauthorized
access

Control Procedure and Explanation


- Use of a password as means of verifying a user's identity before
access
- Equipped it with security features such as Authentication devices
and Encryption
- Limit access to authorized person
- Use of cameras and access log wherein details about visitors access
can be obtained
- Provide a back up computer facility in case of disasters in order to
protect and retrieve data.
- Maintain an audit logs for purposes of audit trail.
Problem Identification and Explanation

3. Risk of Virus Infection


4. Penetration & Manipulation of data and Malfunction of
system (illegal access both internally and from the internet)

Control Procedure and Explanation

-install a effective antivirus software and keep it up to date


-acquire a software firewall
-Use of digital signature
-Use of request response technique
-Use of message sequence numbering
-Use of private key encryption
Problem Identification and Explanation

5.Unexpected transmission problem

Control Procedure and Explanation


-Use of parity check
-Use of echo check

Você também pode gostar