Security - Case Study Example

Comments (0) Cite this document
Summary
But this idea is hit by several problems in the practical implementation of the idea. This paper will analyze the system and come up with problems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Security
Read TextPreview

Extract of sample "Security"

Download file to see previous pages As technology grows, it has become much easier to work. You can store a lot of information and retrieve it very fast at the touch of a button. Well, this has brought to end the carrying of books and pens to meetings. This trend has also been picked up by hotels. They are introduced touch pad registers to manage their work efficiently and easily. A fast food franchise introduced touch pad registers. They issued each register with a password and a user ID to log into the system. It allowed them to input their passwords four times before the system locked. With time the system became harder to operate. The touch pads became greasy and some of the of the workers forgot the passwords.
The system was a good idea, but it had several flaws in its design. The fact that this system needed a password and a user ID to log in, it became a problem when the workers forgot their passwords. When a worker entered the password there times unsuccessfully the system locked itself and needed the managers card to reboot the system. In cases where the manager is not present it would be impossible for the workers to use the system. It took some time for the system to reboot. This lost time could translate to looses. If a worker for the password and asked another worker to log in so that they could use the system, it will take it hard for the employers to track the activities in the fast food franchise. This was the main aim of introducing the touch pad register.
The issue with the workers forgetting passwords was because of the keyboard layout. The managers complained about the time that it took to reboot the system. If the shift of a worker ended and they did not log out the system, it needed the manager to reboot the system that took a long time to do. The accumulation of grease on the touch pad made it harder for the workers to input their details. This is because the touch pad did not have any protection against the grease. With all these ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1629477-security
(Security Case Study Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1629477-security.
“Security Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1629477-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security

Security

... A New Technology Creates New Ethical Dilemmas There are two primary reasons of adopting the field of compute professionals i.e. Interest and money(Adams, McCrindle 2008). Modern computer technologies are utilized for assembling, storing, and communicating information. Likewise, new technologies in the field of information technology (IT) are creating ethical dilemmas. The effectiveness and speediness related to the electronic information technology systems that consist of limited and international networks, databases and processing programs. These systems also force consumers to tackle new rights and responsibilities in order to use the data and re-evaluate principles of advent computers (Stahl 2011). 2 The Importance of Ethics... A New...
6 Pages(1500 words)Essay

Security

...Security The paper delves into the concept of online security which is indeed a very fundamental concern in the present world. In this regard, Google is heavily investing in a series of authentication through the use of two-step verification. There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication. Some of the...
4 Pages(1000 words)Essay

Animal Farm

8 Pages(2000 words)Essay

Security

...? INFORMATION TECHNOLOGY SECURITY (Computer Sciences) of (affiliation) of Submission: Estimated word count: 1,937 Introduction The human experience today continues to be benefited and expanding at a very fast rate because of computer-related technologies which contribute greatly to modern conveniences. In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom. Computers had literally made the task of computing very fast and ultra...
6 Pages(1500 words)Case Study

Cyber Security and Information Security

...?Textbook: Management of Information Security by Whitman and Mattord Chapter 2 P. 70 Using a web search engine, find an article from a reputable source published within the past six months that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about financial shifts, but...
4 Pages(1000 words)Assignment

Security

...Security ID Introduction Security is of extreme importance to everyone and this has been identified as such in the everyday affairs in society. This importance is consistent with Maslow’s need hierarchy in which security represents one of the lower order needs that needs to be satisfied before others can be dealt with. It is therefore significant that security is assessed in different contexts. Events in medieval England that led to the creation of private watches and patrols In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can...
7 Pages(1750 words)Essay

Security

...1 A New Technology Creates New Ethical Dilemmas Modern computer technologies are utilized for assembling, storing, operating, communicating information and for spreading data. Likewise, new technologies in the field of information technology (IT) are creating ethical dilemmas. The effectiveness and speediness related to the electronic information technology systems that consist of limited and international networks, databases and processing programs. These systems also force consumers to tackle new rights and responsibilities in order to use the data and re-evaluate principles of advent computers (Stahl 2011). 2 The Importance of Ethics in Information Systems Authority, source and control are the major resources... A New Technology...
6 Pages(1500 words)Essay

Security

... Introduction of Transmitters (Electronic Postmarks) During the period when the federal taxes are due, the U.S. governments Internal Revenue Service (IRS) servers are swamped with upload requests of tax return E-File. When the overloading occurs, the IRS servers display signs of affliction. This occurs when uploads request enter the IRS servers at a greater rate that servers can complete it. This causes a buildup of the number of connection at the IRS servers. Notably, this means that there will be substantial delays for the clients accessing the IRS server. Due to this problem, there is the importance of creation of a method in which people can delay uploading their tax returns. The solution should prevent IRS from spending... Introduction...
2 Pages(500 words)Assignment

Security

...Security Security First, Microsoft added a feature of compatibility with Power View Reports against Multidimensional prototypes (Natan, 2005, p. 74). Second, the 2014 MS SQL server has the new SQL Server Data Tools for Business Intelligence for making Analysis Services prototypes, Reporting Services releases, and incorporation services bundles. Third, the 2014 MS SQL server has memory-enhanced tables that serve as memory-enhanced database engines incorporated into the SQL Server tool (Natan, p. 72). Fourth, the 2014 MS SQL server also has an SQL Server Data Files in Windows Azure facilitates the integral compatibility for SQL Server database files stored as Windows Azure Blobs. With these features, users of the 2014 MS SQL server... will be...
2 Pages(500 words)Assignment

Security

...Security Security I agree with the first and third claims made by the healthcare IT staff. The certification criteria used by HIPAAto justify and fund the shift from paper records to electronic ones is also essential. First, I agree that application-level data security is claimed to be sufficient for HITECH and HIPAA compliance. Application-level data security builds an all-inclusive security program. It is important for healthcare providers to consider and serve in terms of a holistic data security program that integrates security around patient information to hinder its access by unauthorized parties. HIPAA requires...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Security for FREE!

Contact Us