Do ITACS students represent information security vulnerabilities to the school, each other, or both?
Explain the nature of the vulnerabilities ITACS students represent in the context(s) you chose?
Reader Interactions
Comments
Leave a Reply
You must be logged in to post a comment.
Qian Wang says
Yes, students and schools have information security vulnerabilities with each other.
Because of the strong correlation between the school and the students, the individual systems of the school have large data and different access controls, so there are more vulnerabilities.
Example: 1. The student information system is easy to be breached, resulting in the leakage of student information. 2. The access permission setting of the teacher management system is unreasonable, resulting in other personnel being able to change the information at will.