Preview

Nt1330 Unit 3 Essay

Good Essays
Open Document
Open Document
764 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Essay
2. What is the difference between vulnerability and exposure?

Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).

4. What type of security was dominant in the early years of computing?

Security, in its earliest years, consisted of mainly physical security, the need to safeguard the equipment itself. During the next decade, when ARPANET grew in use, more advanced security was needed. This led to the creation of MULTICS, an operating system with security being its main concern. From MULTICS spawned the UNIX operating system which did not require the same in-depth levels of security. In the early 1970's the password function was implemented as one of the first security measures. As computers and networking became more wide spread, during the 1990's, some security measures were implemented though they were seen as a low priority. Because of the lack of security in the start, we now have
…show more content…
If the C.I.A. triangle is incomplete, why is it so commonly used in security?

The C.I.A. triangle is the industry standard for computer security. It has existed since the development of the mainframe. Because it is the industry standard it is still used today because it's characteristics; confidentiality, integrity, and availability are still just as important in today's society. However, it no longer addresses the full breadth of security concerns faced today, so it instead serves as a foundation for a more advanced system, known as the expanded C.I.A. triangle.

8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The nature of the Pentium flaw was in the floating – point math subsection. In certain conditions, low order bits of the result of floating-point division operations would be incorrect. This would lead to an error that will quickly compound in operations to larger errors when future calculations were completed.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Final Exam Review

    • 687 Words
    • 3 Pages

    1. What unit of measurement is a tenfold logarithmic ratio of power output to power input?…

    • 687 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    In scenario 1 you can see electrical equipment plugged in to the mains, which means electricity at work regulation 1989 is applied to this room. The electricity at work 1989 states that all electrical system and circuits should be maintained to make sure that the device runs properly and that there is no faults that could cause harm to user, also before working on a device you should isolate it which mean having an air gap so that electricity does not flow through it while doing repair or maintenance. Another feature of electricity at work 1989 is that all device should go through inspection regularly by a qualified electrician, to look for broken sockets, lose wires and crushed cables, this is to prevent harm to user. All defects should be reported when noticed to make sure they are fixed as soon as possible, when defects are noticed place a ‘DO NOT USE’…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Study Essay

    • 3921 Words
    • 16 Pages

    |Stop Words: |Words that are filtered out prior to or after processing of natural language data (i.e., text) |…

    • 3921 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 5 Essay

    • 364 Words
    • 2 Pages

    Take productivity to the next level and still look sophisticated doing it – the HP ProBook 455 G1 SmartBuy Notebook PC provides reliable system and data processing that helps you get your work done and ready for the next stage.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 7 Essay

    • 301 Words
    • 2 Pages

    Do we really need a major change in the way the IS function is structured...are the necessary changes just minor modifications to accommodate normal growth in computer uses...what are your thoughts / research in this regard.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    The differences are: vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell Partners. Retrieved February 19, 2014, from http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/…

    • 649 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Good Essays

    System. This model helps the organization to prevent security breaches and gives them an amount of time to detect where and when an attack has occurred. If an organization does not have this model to protect their assets their integrity could be destroyed, their systems could get attacked by viruses and cyber terrorism.…

    • 915 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:…

    • 2132 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    In today’s time, every organization is made up of information security systems. Information security systems are what keep an organization running smoothly and efficiently while holding all their important information in their computers and networks. All information security systems consist of password protections, firewalls; many different security features can prevent hackers from attacking, physical protection of the network and computer systems as well as confidentiality requirements.…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Describe any four (4) threats to information security and explain any two (2) methods of defense mechanism used to protect information systems.…

    • 1958 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Virtual Learning Environment

    • 4651 Words
    • 19 Pages

    Why Security? Essential Terminologies Elements of Security The Security, Functionality, and Ease of Use Triangle What Does a Malicious Hacker Do? o Reconnaissance o Scanning o Gaining access o Maintaining access o Covering Tracks…

    • 4651 Words
    • 19 Pages
    Satisfactory Essays