Preview

Information Security Chap 1 Review Questions and Exercise 5

Satisfactory Essays
Open Document
Open Document
994 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Chap 1 Review Questions and Exercise 5
Chapter 1 Review Questions and E5

1. what is the difference between a threat agent and a threat?

Threat: a category of objects, persons, or other entities that presents a danger to an asset Threat agent: the specific instance or component of a threat

2. what is the difference between vulnerability and exposure?

Vulnerability: a weakness or fault in a system or protection mechanism that opens it to attack or damage. Exposure: a condition or state of being exposed. It exists when a vulnerability known to an attacker is present.

3. how is infrastructure protection (assuring the security of utility services) related to information security?

Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system.

4. what type of security was dominant in the early years of computing?

The type of security was dominant in the early years of computing security was entirely physical security. And MULTICS was first noteworthy operating system to integrate security in to its core system.

5. what are the three components of the C.I.A triangle? what are they used for?

1. confidentiality: protect information from disclosure or exposure to unauthorized individuals or systems 2. integrity: when information is whole, complete and uncorrupted 3. availiability: allows authorized users to access information without intereference or obstruction and to receive it in the required format C.I.A. : the industry standard for computer security since the development of the mainframe

6. if the C.I.A. triangle is incomplete, why is it so commonly used in security?

The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major

You May Also Find These Documents Helpful

  • Satisfactory Essays

    First of all, glad to hear from you again after giving you some pointers regarding those interns and your merchandising team.…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Nemours Children Hospital project was a finalist in the 2013 PMI Project of the Year awards. The Project management team was Stanley Beaman and Sears and it had a budget of $260 million dollars. The project management team kept their ethical guideline to build a hospital for children and their parents and remained within their stated budget. They kept in mind the fact that end it was a children’s hospital and kept that fact (beside the budget) uppermost in their mind. The result was a well thought out, beautiful, and functional hospital that has the health of children, both…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Gray Risk (Exogenous): From disclosure to patch the user of the software waits for the vendor to issue a patch. The risk exposure that arises from this period is known as the Gray Risk because the general public is aware of this risk but has not yet received a fix from the software owners. This information is provided in the release of the vulnerability to the organization so they can assess the individual risk and possibly implement a workaround, at least until a patch is accessible.…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    If you have a credit card, pay off the balance each month. This prevents several penalties and late fees. It is best to use a credit card only for emergencies. Keep in mind that the reason you are going to college is to get an education. Debt can cause you to lose focus.…

    • 453 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CIS 517 Assignment 2

    • 252 Words
    • 2 Pages

    Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    10 marker geog

    • 489 Words
    • 2 Pages

    Hazard: A received natural event which has the potential to threaten both life and property.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manage Risk

    • 7591 Words
    • 24 Pages

    4. Insurance: A situation where the probability of a variable (such as burning down of a building) is known but when a mode of occurrence or the actual value of the occurrence (whether the fire will occur at a particular property) is not. A risk is not an uncertainty (where neither the probability nor the mode of…

    • 7591 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    Risk is the chance or probability that a person will be harmed or experience an adverse health effect if exposed to a hazard.…

    • 2324 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    is often useful when the owner of the computer system wants to ensure its security is optimal.…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    The word vulnerable means being exposed physically or emotionally from harm. When I think of the word vulnerability, I think of all of my fears and those fears turning into reality. I become vulnerable because I do not know how to handle or process my fears, It all comes down to being scared. For example,…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risk equals the number of threats against an organization’s resources multiplied by the number of vulnerabilities. Threat is the likelihood that a bad event will occur, vulnerability is the potential weak point, and risk is the result of threat and vulnerability combined.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Pastrolist

    • 1732 Words
    • 7 Pages

    Vulnerability to HIV and AIDS Vulnerability refers to all factors that makes a person more susceptible to HIV infection and to developing AIDS.…

    • 1732 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The potential of loss (an undesirable outcome, however not necessarily so) resulting from a given action, activity and/or inaction, foreseen or unforeseen.…

    • 3308 Words
    • 14 Pages
    Good Essays