answersLogoWhite

0


Best Answer

System engineers are constantly facing organizational structure and "security" issues when designing an information system.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the problems that system engineers face while designing a secure information system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What Principles are essential to a secure information systems?

All of the following are principles essential to a secure information system except:


What are the principles essential to a secure information systems?

All of the following are principles essential to a secure information system except:


How secure is a blog?

It is secure as long as you will be careful to put any confidential information from you.


How does the Password Folder app enable the user to keep their information secure?

The Password folder app enables users to keep their information secure by acting as a vault so one's data can be totally secure. All information fully secure and encrypted so it is protected by malware, hackers, and thieves.


What are three properties of peer to peer application?

1. no router required 2. secure 3.no trafic problems 1. no router required 2. secure 3.no trafic problems


All of the following are principles essential to a secure information system?

All of the following are principles essential to a secure information system except:


Where can one find information on how to secure loans?

One can easily find information on how to secure loans by calling their trusted bank and talking with an associate with the knowledge of the information being seeked.


What is the best secure eCard site to post pictures?

The best secure website to post pictures in ecards is www.ecardster.com/ It keeps all your information secure and protects you from getting hacked or sending our your personal information.


How do you design a commercial kitchen?

The process of designing a commercial kitchen involves a lot of planning. Generally, these are the steps to designing a kitchen: Design Consultation, Secure Financing, Full-scale Blueprints, Material Selection, Execution of the Build, and Final Walkthrough.


How do you support others to understand the need for secure handling of information?

To support others in understanding the need for secure handling of information, I emphasize the importance of protecting sensitive data from cyber threats and breaches. I provide clear examples of the potential consequences of a security breach, such as financial losses or damage to reputation. Additionally, I offer guidance on best practices for securely storing, transmitting, and disposing of confidential information.


Who is the secure in post and get method?

Post is more secure method in forms. It does not supply the form information in the URL.


What is a principle maintained by a secure information system?

Authentication