Preview

Information Security

Powerful Essays
Open Document
Open Document
874 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
1. What is the difference between a threat agent and a threat?
A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.
2. What is the difference between vulnerability and exposure?
The differences are: vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.
3. How is infrastructure protection (assuring the security of utility services) related to information security? Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system.
4. What type of security was dominant in the early years of computing?
The type of security was dominant in the early years of computing security was entirely physical security. And MULTICS was first noteworthy operating system to integrate security in to its core system.
5. What are the three components of the C.I.A. triangle? What are they used for?
The three components of the C.I.A triangle are:
Confidentiality: Information’s should only be accessible to its intended recipients. Integrity: Information arrive the same as it was sent.
Availability: Information should be available to those authorized to use it.
6. If the C.I.A. triangle is incomplete, why is it so commonly used in security?
The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major characteristic confidentiality, integrity and availability which are important even today.
7. Describe the critical characteristics of information. How are they used in the study of computer security? The critical characteristics of

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    are also part of a comprehensive security program because they enable you to detect a…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Explain The Purpose of Legal And Organisational Requirements For The Security And Confidentiality Of Information…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Final project it255

    • 1631 Words
    • 5 Pages

    System security has been very important ever since the beginning of the computer age. Security is setup for a number of reason whether it be to protect data from those who are not supposed to see it or hide it from those who are supposed to security at any point is important. Security can be physical, virtual or a mixture of the two, but in this day and age it is definitely needed. In the following I will give my opinion on how to increase or the steps I would use to implement security to a certain situation.…

    • 1631 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security. Also called…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1.1 Identify legislation and codes of practice that relate to handling information in health and social care…

    • 291 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Confidentiality: data is only accessed by people who have the right to view the information.…

    • 1186 Words
    • 5 Pages
    Better Essays
  • Better Essays

    1.2Legal requirements and codes of practice: issues relating to the legal requirements for secure recording of information eg the common law duty of confidence, the legal requirements for accuracy of information and for information to kept up-to-date, obtaining personal data only for specific, lawful purposes and for personal data to be relevant and not excessive for its purpose; issues relating to the legal requirements for the secure storage of information eg the legal requirements that personal data should not be kept for longer than is necessary for its purpose, security measures to protect against the accidental loss, destruction or damage to personal data, legal requirements for the storage of electronic and manual data and access to secure information; issues relating to the legal requirements for sharing information eg…

    • 1407 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Risk equals the number of threats against an organization’s resources multiplied by the number of vulnerabilities. Threat is the likelihood that a bad event will occur, vulnerability is the potential weak point, and risk is the result of threat and vulnerability combined.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays