Preview

Cool Paper

Better Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cool Paper
Chapter 1 Review Questions
1. Each of the following factors illustrates why information security is increasingly difficult except _______. a. faster computer processors b. growing sophistication of attacks c. faster detection of weaknesses d. distributed attacks
2. A type of software that repairs security flaws in an application is called a(n) _____. a. hot fix b. exploit c. repair d. patch
3. The primary goal of information security is to protect __________. a. procedures b. people c. information d. products
4. Each of the following is a characteristic of information except ________. a. integrity b. confidentiality c. conformity d. availability
5. Each of the following is intended to protect information except _________. a. people b. policies c. equipment d. confidentiality
6. Information security procedures tell the people how to use products to protect information. True or false?
7. Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?
8. The theft of data is the least significant cause of financial loss due to a security breach. True or false?
9. Integrity ensures that information is correct and that no unauthorized person or malicious software program can or has altered that data. True or false?
10. Attackers can now use hundreds or thousands of computers in an attack against a single computer or network, making it impossible to stop an attack by identifying and blocking the source. True or false?
11. While most attacks today take advantage of vulnerabilities that someone has already uncovered, a(n) _____ occurs when a hacker discovers and exploits a previously unknown flaw. day zero attack
12. _____ involves assuring that only authorized parties can view information. Confidentiality
13. Under the _____, healthcare enterprises must guard

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    What is the name of the Microsoft® Windows 2003 XP server Security Patch needed to remediate this software vulnerability and exploit?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Taking these factors into account, it can be safe to say it was an actual attack rather than just legitimate network usage. Now that it is known what such an event would look like, identifying similar attacks in the future will be much easier and may allow for limited down time.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    26. Separation of duties, periodic vacation, and job rotation are the ways to reduce human risk factors within an organizational structure.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    12. Which of the following acts allow anyone to get access to unclassified information through legal means?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Explain the purpose of legal and organizational requirements for the security and confidentiality of information:…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    All information is to be kept up to date and accurate and stored securely in a locked cupboard or…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    2. List three important facts that the author uses to support the main idea: A. Verification and Validation involves static formal mathematical techniques such as proof of correctness and dynamic techniques such as testing to show consistency between the code and the basic initial specifications. B. Consumer protection consists of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. C. Software is an integral part of a computer system and the security of such a system depends on its hardware but even more so on the software component. There are more security attacks on systems through software “holes” than hardware, mainly through piracy, deletion and alteration of programs and data.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    a. There was almost a 60% shift from a SMB type attack, towards an HTTP-based attack. In addition, nearly 100% of the observed attacks are automated, botnet, or worm-based attacks.…

    • 1087 Words
    • 3 Pages
    Powerful Essays