Preview

Info Systems

Satisfactory Essays
Open Document
Open Document
251 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Info Systems
Part I: True/False evaluation and Multiple-choice questions (0.5 points/each question)

1. The overarching goal of information security is to ensure data integrity, availability, and confidentiality.

2. Managing security refers to a comprehensive set of activities that develop, implement, direct, and monitor the organization’s security strategy and activities.

3. The most expensive cybercrime are computer viruses.

4. Authentication is a means of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be refused.

5. The trend in computer security is toward policy-based management.

6. The core challenge of security management is ___________.
a) Finding the right balance between shielding the organization’s main assets from potential harm
b) Enabling staff to do their jobs
c) Both a) and b)

7. Which of the following hacker tricks involves launching software that monitors all traffic looking for passwords or other valuable information?
a) Main-in-the middle
b) Denial of service
c) Trojan horse
d) Network sniffing

8. Defining security policies and then managing and enforcing those policies via security management products and services is known as _______.
a) Intrusion-based management
b) Policy-based management
c) Incident-based management

9. To protect against spoofing, firms need a way to ____________.
a) Authenticate the identity of an individual
b) Repudiate the identify of an individual
c) Dispute the identity of an individual

10. To protect against hacking, companies install ___________ which controls access between networks.
a) Virtual private systems
b) Encryption
c)

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Info Systems

    • 1106 Words
    • 5 Pages

    8) When a business process is determined to have poor performance, the firm should always…

    • 1106 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    The Management Security Policy stipulates that components must adhere to periodic risk assessments, systems and services acquisition, and planning, as well as accreditation, certification and security assessments. The Operational Security Policy provides detailed guidelines regarding physical and environmental protection, personnel security, contingency planning, maintenance, conflict management, system and information integrity,…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Information Systems

    • 386 Words
    • 2 Pages

    d) Explain how the two tables are related. Which table contains the foreign key? What is the foreign key?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays