Ibrahim Braimah reveiw questions week 1 PDF

Title Ibrahim Braimah reveiw questions week 1
Author Ibrahim Braimah
Course Introduction To Computer Security
Institution New York City College of Technology
Pages 4
File Size 45.2 KB
File Type PDF
Total Downloads 61
Total Views 138

Summary

Download Ibrahim Braimah reveiw questions week 1 PDF


Description

Ibrahim Braimah Review questions p44 CST 2410

1. What is the difference between a threat agent and a threat? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack, an example of a threat would be an atomic bomb while the threat agent would be the user of the atomic bomb.

2. What is the difference between vulnerability and exposure? Vulnerability would be a weakness or a fault in a system while exposure would be a single instance when a system is open to damage.

3. How is infrastructure protection (assuring the security of utility services) related to information security? It addresses the fundamental concerns of information: confidentiality, integrity and availability.

4. What type of security was dominant in the early years of computing? Physical security was dominant in the early years of computing.

5. What are the three components of the C.I.A. triad? What are they used for? The three components of the C.I.A triad are Confidentiality, integrity and availability. They are used for as a guide for organizations to keep sensitive

6. If the C.I.A. triad is incomplete, why is it so commonly used in security? It is so commonly used in security because it serves as a guide to help keep classified information safe.

7. Describe the critical characteristics of information. How are they used in the study of computer security? Availability enables authorized users to access to access computer information without interference or obstruction. Accuracy ensures that information is free from mistakes or errors and it has the value that an end user expects. Authenticity of information is the quality or state of being genuine or original rather than a reproduction or fabrication. Confidentiality is achieved when disclosure or exposure of information to unauthorized personnel is achieved. For example. A Nurse knowing your credit score would be a breach of confidentiality Integrity of information is maintained when it is whole, complete and uncorrupted. Utility of information is the quality or state of that information having value for some purpose or end. Possession of information is the quality or state of ownership or control of some object or item.

8. Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study? The six components of an information system are computer hardware, computer software, databases, network, human resources.

9. What system is the predecessor of almost all modern multiuser systems? Multics is the predecessor of almost all modern multiuser systems.

10. Which paper is the foundation of all subsequent studies of computer security? Rand report R-609 is the foundation of all subsequent studies of computer security.

11. Why is the top-down approach to information security superior to the bottom-up approach? Top-down approach has a higher probability of success. It has a higher probability of success. It is a methodology of establishing security policies that is initiated by upper management who issues policies, procedure and process.

12. Why is a methodology important in the implementation of information security? How does a methodology improve the process? Methodology ensures the strict / perfectly defined process and it increases the likelihood of success. It improves the process because it unifies the process of identifying specific threats and the creations of specific controls to counter those threats into a coherent program. 13. Which members of an organization are involved in the security systems development life cycle? Who leads the process? The upper management-initiation and control. Responsible managers, contractors, and employees execute and it is led by the senior executive. 14. How can the practice of information security be described as both an art and a science? How does the view of security as a social science influence its practice? Information is a science because It requires various kinds of tools and technologies used for technical purposes. It can also include sound information security plans and policies that may dictate the needs of particular technologies.

15. Who is ultimately responsible for the security of information in the organization? CISO is ultimately responsible for the security of information in the organization.

16. What is the relationship between the MULTICS project and the early development of computer security?

17. How has computer security evolved into modern information security? Computer security consisted of securing a system’s physical location with badges, keys and facial recognition. To ensure total security, the information itself, as well as the hardware used to transmit and store it needed to be protected. 18. What was important about RAND Report R-609? Rand report R-609 was the first widely recognized published document to identify the role of management and policy issues in computer security.

19. Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these decisions are carried out? Data owners, data custodians and data users.

20. Who should lead a security team? Should the approach to security be more managerial or technical? The senior executive who is at the highest level or the organization should lead a the security team....


Similar Free PDFs