Intro to COMP SCI question
The table below lists a series of specific mitigation strategies. For each of the threat scenarios described below, list all of the mitigation strategies below that can significantly improve security
antivirus software
file backup
one-way encryption
callback firewall
two-way encryption
digital signature
log files
spam filter
1. You work for the United States government and your machine stores highly-classifiedinformation. You do not use this computer for e-mail, but it is connected to the Internet. Not only are you expected to maintain the confidentiality of the classified information, it is also expected that anyone attempting an attack on this machine must be caught and prosecuted.
2. You are writing a computer program to store personal identification numbers (PINs) for acompany that manufactures automated teller machines (ATMs).
3. You work for a financial company, and your boss frequently e-mails you instructions tomake large, expensive stock purchases and sales. If you get the instructions wrong, youcould lose your job (and cost the company a lot of money).