Preview

Information Security Review Questions CH1

Good Essays
Open Document
Open Document
982 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Review Questions CH1
Chapter 1 - Review Questions
Answer each question completely. This information is from Chapter 1 in your textbook.
Submit your completed file through the ASGN_C1 assignment in Blackboard. For information on how to submit assignments, refer to SUBMITTING ASSIGNMENTS IN BLACKBOARD located in Course Materials.
1. What is the difference between a threat agent and a threat? A threat is a general term used to describe a category of items that present a risk in jeopardizing the safety of an asset. A threat agent is a more specific term used to describe an exact piece of a threat. For example, all kitchen appliances pose a threat to those who use them, while a gas stove is a specific threat agent in this case.
2. What is the difference between vulnerability and exposure? Vulnerability is a flaw in a system that leaves it open to damage. Exposure occurs when the vulnerability is known, or exposed, to an attacker. A car that is kept unlocked is an example of vulnerability. Exposure occurs when a thief knows that the car is kept unlocked.
3. How is infrastructure protection (assuring the security of utility services) related to information security? Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.
4. What type of security was dominant in the early years of computing? Physical controls (badges, keys, etc.) were dominant during World War II, because one of the main threats at that time was physical theft of equipment.
5. What are the three components of the CIA triangle? What are they used for? The three components of the CIA triangle are confidentiality, integrity, and availability of information. These components are used as the industry standard for computer security and they describe the utility of information.
6. If the C.I.A. triangle is

You May Also Find These Documents Helpful

  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fin/370 Week 1 Assignment

    • 636 Words
    • 3 Pages

    Risk is a probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action. The role of risk in finance is the probable ability of an investment to fail.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pys-270 Dq 1&2 Wk1

    • 756 Words
    • 4 Pages

    * Danger- The possibility of suffering harm, or injury; Exposure or vulnerability to harm or risk ("Merriam-Webster Dictionary", 2013) Example: A person who has threaten or tried to commit suicide.…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    M3

    • 1140 Words
    • 3 Pages

    A hazard is anything that has the potential to cause harm. Risk is the likelihood of that harm. For example hazards in terms of infection control are pathogens. Some pathogens are considered a greater risk to others, for example MRSA (super bug) or Clostridium difficile.…

    • 1140 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Manage Risk

    • 6382 Words
    • 19 Pages

    a) Risk: A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 6382 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    A hazard is something that could cause harm and a risk is the chance, high or low that someone could be harmed by that hazard. A health risk is a risk leading to an illness, a safety risk is a risk leading to a personal injury or damage to equipment and buildings and a security risk is a risk leading to theft, abduction, and intruders or leaving without consent.…

    • 3241 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    A hazard is something that can cause harm to anybody such as electricity and different chemicals. Whereas a risk is the rating that shows that somebody will get hurt by the hazard. Most risks are calculated in categories of low medium and high…

    • 941 Words
    • 5 Pages
    Satisfactory Essays