Intrusion Detection (graded)
Your organizations business manager has read an article about how intrusion detection systems can help deter hackers. He or she wants to spearhead a campaign to deploy them around the companys locations in three states. Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary? Specific to this example, how do you respond to ad hoc security requests like this? In general, how can you keep requests like this in check?
Dq2
Engineering software is like engineering a car; if one were so inclined, there could be a completely bug- and security-free application. Do you agree with this? Why or why not?