Computer Science: An Overview: Global Edition (12th Edition)

Published by Pearson Higher Education
ISBN 10: 1292061162
ISBN 13: 978-1-29206-116-0

Chapter 9 - Database Systems - Social Issues - Page 455: 6

Answer

See the explanation

Work Step by Step

The degree of responsibility for the misuse of information depends on various factors, including the extent of security measures implemented by the database designers. If the flaw in the design is easily exploitable, the designers may share a higher degree of responsibility, irrespective of the effort required by the perpetrator. A robust and secure database design should aim to minimize the risk of unauthorized access. The degree of effort required to exploit the flaw can influence how responsibility is distributed: - Low Effort (e.g., simple URL manipulation, no login required) - High Effort (e.g., reverse engineering, bypassing multiple layers)
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.