For your system what roles or people are there with


Describe the system (briefly!). As in: I'm going to talk about the _____ system, which does this, that and the other thing.

When we talk about confidentiality, we're talking about unauthorized access to information. That means there is (or at least probably is) authorized access to information. For your system, what roles or people are there with authorized access - and what information can they see or use. Is there anything special about their roles or their level of access? Are there exceptions?

What (briefly) is the worst possible scenario you can think of for a confidentiality failure/breach? What repercussions or impacts are there?

How - in technical or other terms - could (or can) you improve the security of the situation? What measures or technologies would make sense? Why?

Solution Preview :

Prepared by a verified Expert
Management Information Sys: For your system what roles or people are there with
Reference No:- TGS01116059

Now Priced at $30 (50% Discount)

Recommended (97%)

Rated (4.9/5)