Preview

Information Security Chap 1 Review Questions and Exercise 5

Satisfactory Essays
Open Document
Open Document
994 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Chap 1 Review Questions and Exercise 5
Chapter 1 Review Questions and E5

1. what is the difference between a threat agent and a threat?

Threat: a category of objects, persons, or other entities that presents a danger to an asset Threat agent: the specific instance or component of a threat

2. what is the difference between vulnerability and exposure?

Vulnerability: a weakness or fault in a system or protection mechanism that opens it to attack or damage. Exposure: a condition or state of being exposed. It exists when a vulnerability known to an attacker is present.

3. how is infrastructure protection (assuring the security of utility services) related to information security?

Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system.

4. what type of security was dominant in the early years of computing?

The type of security was dominant in the early years of computing security was entirely physical security. And MULTICS was first noteworthy operating system to integrate security in to its core system.

5. what are the three components of the C.I.A triangle? what are they used for?

1. confidentiality: protect information from disclosure or exposure to unauthorized individuals or systems 2. integrity: when information is whole, complete and uncorrupted 3. availiability: allows authorized users to access information without intereference or obstruction and to receive it in the required format C.I.A. : the industry standard for computer security since the development of the mainframe

6. if the C.I.A. triangle is incomplete, why is it so commonly used in security?

The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major

You May Also Find These Documents Helpful

  • Good Essays

    The Nemours Children Hospital project was a finalist in the 2013 PMI Project of the Year awards. The Project management team was Stanley Beaman and Sears and it had a budget of $260 million dollars. The project management team kept their ethical guideline to build a hospital for children and their parents and remained within their stated budget. They kept in mind the fact that end it was a children’s hospital and kept that fact (beside the budget) uppermost in their mind. The result was a well thought out, beautiful, and functional hospital that has the health of children, both…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    First of all, glad to hear from you again after giving you some pointers regarding those interns and your merchandising team.…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Gray Risk (Exogenous): From disclosure to patch the user of the software waits for the vendor to issue a patch. The risk exposure that arises from this period is known as the Gray Risk because the general public is aware of this risk but has not yet received a fix from the software owners. This information is provided in the release of the vulnerability to the organization so they can assess the individual risk and possibly implement a workaround, at least until a patch is accessible.…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    If you have a credit card, pay off the balance each month. This prevents several penalties and late fees. It is best to use a credit card only for emergencies. Keep in mind that the reason you are going to college is to get an education. Debt can cause you to lose focus.…

    • 453 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risk: When a corporation or individual analyze whether or not an investment will yield them a loss.…

    • 423 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CIS 517 Assignment 2

    • 252 Words
    • 2 Pages

    Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    The C.I.A. triangle is the industry standard for computer security. It has existed since the development of the mainframe. Because it is the industry standard it is still used today because it's characteristics; confidentiality, integrity, and availability are still just as important in today's society. However, it no longer addresses the full breadth of security concerns faced today, so it instead serves as a foundation for a more advanced system, known as the expanded C.I.A. triangle.…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    10 marker geog

    • 489 Words
    • 2 Pages

    Hazard: A received natural event which has the potential to threaten both life and property.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    is often useful when the owner of the computer system wants to ensure its security is optimal.…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Eifs Pros And Cons

    • 1411 Words
    • 6 Pages

    This support is pivotal in the case for EITs, and detrimental for the case against. While some may argue that even though the majority of Americans support the use of EITs, that there are still many who do not, the fact remains that America is a democracy. If there were to be a vote today to decide if the CIA would be allowed to continue in the practice of using EITs on terror suspects, it would pass. This is a crucial fact that should have a profound impact on ones understanding of the argument in favor of EITs. EITs are a well-supported and respected aspect of national security, and should be treated as such.…

    • 1411 Words
    • 6 Pages
    Good Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Risk equals the number of threats against an organization’s resources multiplied by the number of vulnerabilities. Threat is the likelihood that a bad event will occur, vulnerability is the potential weak point, and risk is the result of threat and vulnerability combined.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Pastrolist

    • 1732 Words
    • 7 Pages

    Vulnerability to HIV and AIDS Vulnerability refers to all factors that makes a person more susceptible to HIV infection and to developing AIDS.…

    • 1732 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The potential of loss (an undesirable outcome, however not necessarily so) resulting from a given action, activity and/or inaction, foreseen or unforeseen.…

    • 3308 Words
    • 14 Pages
    Good Essays