Preview

Ch02

Satisfactory Essays
Open Document
Open Document
3231 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ch02
Chapter 2: Security of Technical Systems in Organizations: An Introduction

1. True or false?

a. Perpetrators of information systems typically stick to the easiest, simplest means to attack.
b. Principle of easiest penetration suggests that security is impossible because strengthening one weakness might make another more attractive to perpetrators.
c. Modification vulnerability occurs when data is changed.
d. Destruction vulnerability occurs when the hardware, software, or the data is destroyed.
e. Disclosure of data takes place when data is made available to all employees of a firm.
f. Copying of programs, data, or other confidential information can be the results of interception.
g. Interruption occurs when a computer system becomes unavailable for legitimate users.
h. A counterfeit record added to a database is an example of fabrication.
i. Hardware can get destroyed when natural disaster and terrorist arise.
j. More people are involved in hardware protection than in software protection.
k. Value of data is time sensitive.
l. Valuable data should be protected at all cost.
m. Access controls act as means to protect confidentiality of data.
n. Confidentiality loss occurs only after direct disclosure of data.
o. The need to know principle is to ensure confidentiality.
p. The need to know principle works better in business environment than in military environment.
q. The requirement of integrity suggests that all data is present and accounted for, irrespective of it being accurate or correct.
r. Availability attacks are usually the most difficult to detect.
s. Authentication assures that a message is from a real person.
t. Digital signatures can be used to prevent non repudiation.
u. Encrypted messages are unintelligible to unauthorized observers.
v. When design software controls, security controls are always the most important.
w. Simple physical controls, such as ensuring locks on doors, guards at entry doors no longer work in today’s information technology

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NVQ 3 UNIT 37

    • 453 Words
    • 2 Pages

    A good way of maintaining records is on a computer or in a file that can be kept confidential and kept up to date. Records should be updated each time the individuals are seen to. These updates could include:…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ch02 c

    • 2468 Words
    • 11 Pages

    9. The term “data structures” refers to the speed at which data it is captured, analyzed, and reported.…

    • 2468 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    11. In a data classification scheme, least privilege and need to know ensures that access to data and information is available to __________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    Question 4: Data integrity is essential for a company 's operations. Describe various steps companies can use to ensure the integrity of its information.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    11. In a data classification scheme, least privilege and need to know ensures that access to data and information is available to __________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ch15

    • 1954 Words
    • 11 Pages

    15.2 While there is systematic risk within a nation, it may be _______ and diversifiable outside the country after constructing a global portfolio.…

    • 1954 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ch

    • 825 Words
    • 2 Pages

    1. Analyze the rise in Big Business in the Gilded Age. Why was there a trend towards bigger businesses after the Civil War? How did the rise in Big Business affect business activities, including labor, and the economy? Why was the Big Business's rise so significant to the development of the American economy?…

    • 825 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ch23

    • 1630 Words
    • 10 Pages

    Gymnosperm are characterized by producing "naked seeds". Which of the following group is not classified as a gymnosperm?…

    • 1630 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    b. The Profession of Arms is uniquely expert work in which effectiveness is the ultimate key. Professionals are expected to earn trust through an intense…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch2

    • 3064 Words
    • 10 Pages

    a. Based on the spreadsheet data, how would you characterize Steel Works’ products? What about Steel Works’ customers? Given your answer and the information in the case what does this suggest?…

    • 3064 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    The following attempts to illustrate when data can be disclosed. This list is not exhaustive.…

    • 5095 Words
    • 21 Pages
    Better Essays
  • Good Essays

    | |Verification: Any data obtained should be able to be verified no matter who obtained it. This goes back to consistency also, no matter who obtains the data the outcome should still be the |…

    • 622 Words
    • 3 Pages
    Good Essays