Preview

Information Security Review Questions CH1

Good Essays
Open Document
Open Document
982 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Review Questions CH1
Chapter 1 - Review Questions
Answer each question completely. This information is from Chapter 1 in your textbook.
Submit your completed file through the ASGN_C1 assignment in Blackboard. For information on how to submit assignments, refer to SUBMITTING ASSIGNMENTS IN BLACKBOARD located in Course Materials.
1. What is the difference between a threat agent and a threat? A threat is a general term used to describe a category of items that present a risk in jeopardizing the safety of an asset. A threat agent is a more specific term used to describe an exact piece of a threat. For example, all kitchen appliances pose a threat to those who use them, while a gas stove is a specific threat agent in this case.
2. What is the difference between vulnerability and exposure? Vulnerability is a flaw in a system that leaves it open to damage. Exposure occurs when the vulnerability is known, or exposed, to an attacker. A car that is kept unlocked is an example of vulnerability. Exposure occurs when a thief knows that the car is kept unlocked.
3. How is infrastructure protection (assuring the security of utility services) related to information security? Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.
4. What type of security was dominant in the early years of computing? Physical controls (badges, keys, etc.) were dominant during World War II, because one of the main threats at that time was physical theft of equipment.
5. What are the three components of the CIA triangle? What are they used for? The three components of the CIA triangle are confidentiality, integrity, and availability of information. These components are used as the industry standard for computer security and they describe the utility of information.
6. If the C.I.A. triangle is

You May Also Find These Documents Helpful

  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Fin/370 Week 1 Assignment

    • 636 Words
    • 3 Pages

    Risk is a probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action. The role of risk in finance is the probable ability of an investment to fail.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hazard, Risk and Vulnerability are individual terms that have different meanings but all three are used in the assessment of disasters. These three concepts can be used to create an analysis to better prepare an agency, community and individual to mitigate the undesired outcomes. The Federal Emergency Management Agency calls this analysis a Hazard, Vulnerability Analysis and Risk Assessment. The analysis and assessment will assist the organization properly prepare for the hazards, identify the risks and mitigate the vulnerabilities.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Kaplan, S, and Garrick, B. J (2006) say that risk is the notion of uncertainty while there being a likelihood of some kind of loss or damage and that risk is simply the conversion of a hazard into the delivery of a loss of damage. They say risk can be reduced through safeguards and use an example of being out in the ocean, which is a hazard, and instead of crossing it in a rowboat, which would be a high risk; you can cross it in a liner to reduce that risk. According to the Oxford English Dictionary the definition of risk is ‘a situation involving exposure to danger’. Both definitions are similar but Kaplan and Garrick’s is more detailed by explaining that hazards are the source of the risk.…

    • 2276 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Pys-270 Dq 1&2 Wk1

    • 756 Words
    • 4 Pages

    * Danger- The possibility of suffering harm, or injury; Exposure or vulnerability to harm or risk ("Merriam-Webster Dictionary", 2013) Example: A person who has threaten or tried to commit suicide.…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    M3

    • 1140 Words
    • 3 Pages

    A hazard is anything that has the potential to cause harm. Risk is the likelihood of that harm. For example hazards in terms of infection control are pathogens. Some pathogens are considered a greater risk to others, for example MRSA (super bug) or Clostridium difficile.…

    • 1140 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Manage Risk

    • 6382 Words
    • 19 Pages

    a) Risk: A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 6382 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A hazard is something that can cause harm to anybody such as electricity and different chemicals. Whereas a risk is the rating that shows that somebody will get hurt by the hazard. Most risks are calculated in categories of low medium and high…

    • 941 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    A hazard is something that could cause harm and a risk is the chance, high or low that someone could be harmed by that hazard. A health risk is a risk leading to an illness, a safety risk is a risk leading to a personal injury or damage to equipment and buildings and a security risk is a risk leading to theft, abduction, and intruders or leaving without consent.…

    • 3241 Words
    • 13 Pages
    Good Essays