Preview

Principles of Information Security and Privacy

Satisfactory Essays
Open Document
Open Document
360 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Principles of Information Security and Privacy
SEC571 Principles of Information Security and Privacy
Midterm Study Guide

The midterm exam consists of 5 questions which relate to material from the first 4 weeks of the course including assigned reading from the text, lectures, tutorials, and threaded discussions. The exam questions are randomly selected for each student from question pools so that the questions you get will be different from those another student gets. Specifically, the questions address Terminal Course Objectives A, B, and C.

A
Given a specific description of hardware, systems software, and application software components of a computer-based system, identify and assess the controls we expect to find in each of the system components and describe how they function.
B
Given a Local Area Network (LAN) and Wide Area Network (WAN), identify and analyze the inherent weaknesses and exposures, identify control techniques commonly used to provide security of data and control over access to the network, and demonstrate how a security plan functions to safeguard against unauthorized network access.
C
Given a computer network for data transmission, identify and analyze the possibilities for loss or modification of data and demonstrate techniques to safeguard data from loss, modification or improper disclosure during transmission by using encryption, digital signatures, cryptographic seals and time stamp techniques and describe how they provide the elements of secrecy, authenticity, detection of modification and detection of reuse of the transaction data.

In preparing for the exam you should be familiar with:
Information security objectives as drivers for security architecture development.
Identification of security threats and vulnerabilities in enterprise environments.
Identification of security controls used to address threats and vulnerabilities in enterprise environments.
Strategies and controls used in the development of trusted operating systems and programs.
Strategies and

You May Also Find These Documents Helpful

  • Good Essays

    This midterm examination is open book, open notes, but you are on the honor system not to seek assistance from anyone to complete this exam. There are 25 multiple choice questions worth 2 points each and 10 essay questions worth 5 points each, for a total of 100 points. Answer all the questions because for the essays partial credit is given where appropriate. Just submit the question number and your answer. Please do not submit the entire exam with questions and your answers because it will take up too much memory and it will take too much time to grade the exams. So delete everything but the question number and your answer (i.e. “1.c”) and submit to the Assignments section of WT no later than 9pm March 17. 5 point penalty for each day late.…

    • 3816 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at the LAN-to-WAN Domain level.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    LAN domains are a collection of computers connected to one another. Threats for LAN domains include unauthorized access to the LAN, and unauthorized access to systems applications and data. The solutions for these threats are similar to that of the workstation domain. Another major threat are confidentiality of data transmissions via WLAN connections is compromised. Implementation of encryption between…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Study Guide

    • 679 Words
    • 3 Pages

    The Midterm is multiple pages and consists of 30 multiple choice questions, one essay question, and one problem. The multiple choice questions are worth 3 points each. Some of the multiple choice questions are problem-based. There is also one essay question worth 25 points and one problem worth 35 points. Terminal Course Objectives A, B, C, D, and E are all addressed on this exam.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Personal Computers Dq

    • 270 Words
    • 2 Pages

    As you have discovered, there are a variety of computers available, from the smallest computer in a domestic device to the supercomputers used in industry. Despite the different uses of computers, they all have basics elements in common- each computer system involves hardware, software, data, & users. Think about the role of each component of your home or work computer. How do the components of your computer system interact within the system? What improvements or additions to your system do you think would benefit you or make the system more user-friendly? Why?…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    This paper will describe the security monitoring activities that should be implemented and carried out in an organization on both internal and e-commerce applications. Managing risk is very crucial and plays an integral part in an organization especially to those that considers data as one of their asset. In this time and age, good risk management is the basis in achieving good business and attaining the company’s goals high ROI (Return On Investment).…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Explain the hardware, software and peripheral components of a computer system and the functional relation between these components.…

    • 1626 Words
    • 7 Pages
    Better Essays