Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Answer each of the above in the form of a bulleted list, with brief justificatio

ID: 3747013 • Letter: A

Question

Answer each of the above in the form of a bulleted list, with brief justifications or explanations as necessary. State any critical assumptions you decide to make. Your grade will be based on the thoroughness, realism, and thoughtfulness of your analysis. You will be required to analyze two scenarios, as described below.

1.Pick one of the following scenarios.
(a) You are managing the security of checked luggage at O'Hare Airport.
(b) You are in charge of security at Chicabo Bulls' home arena.
(c) Your work for a company that does background checks for prospective hires for the Federal government.
(d) You are developing and deploying a self-checkout system for a super market chain.
(e) You manage a bug tracker for the developers of a popular web browser; some bug reports are about sensitive security issues.

2. Choose another scenario from everyday life that we haven’t discussed in class. Your choice may be directly related to computer security, but it doesn’t have to be.

It could be about a specific security aspect of any given organization/company/university/etc.

Explanation / Answer

A) manage security of checked luggage :

D) self check out system

2)

Jwellery shops / organizations dealing with expensive jwels need high security so there should be proper systems which can ease the process and decrease the employee need .

For example : when some jwels are ordered by shop owner they arrive from different different locations and they need clearance certificate wheather they are real or fake .so instead of hiring some employee for process computer softwares or devices can be designed which will check reality of that jwel and that will make process faster and time saving . And cost of appointing employee will reduce .ensuring high security .