New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
principles of information security
Principles Of Information Security 7th Edition Michael E. Whitman, Herbert J. Mattord - Solutions
True or False: Regardless of what information a company manages, it is shielded from local and state laws and regulations because the federal laws supersede them.
Which of the following is an American contribution to an effort to improve copyright protection internationally?a. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)b. Digital Millennium Copyright Act (DMCA)c. Privacy and Electronic Communications Regulations of 2003d.
Which of the following respected professional society was founded in 1947 as "the world’s first educational and scientific computing society"?a. Council of Europe Convention on Cybercrimeb. SANSc. Information Systems Security Associationd. Association of Computing Machinery (ACM)
Illustrate to students that intellectual property is recognized as a protected asset in the United States. U.S. copyright laws extend this privilege to the published word, which includes electronic formats.Explain how fair use of copyrighted materials includes their use to support news reporting,
What is the name of a nonprofit organization that focuses on the development and implementation of information security certifications?a. International Information Systems Security Certification Consortium, Incb. Information Systems Audit and Control Associationc. System Administration, Networking,
Recall that the Sarbanes–Oxley Act of 2002, which is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms, seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of
True or False: The Federal Bureau of Investigation (FBI) is the federal agency responsible for signal intelligence and information system security of classified systems.
Justify that this law provides the right of any person to request access to federal agency records or information not determined to be a matter of national security. These requests must be provided to them in writing and are enforceable in court should noncompliance occur.Stress that this does not
True or False: The National Security Agency (NSA) is responsible for the security of all national critical infrastructure.
Explain that the Payment Card Industry (PCI) Security Standards Council offers a standard of performance to which participating organizations must comply. Point out that it is not a law, but is a standard designed to enhance the security of customers’ account data.Review the six areas that the
Remind students that in addition to the national and international restrictions placed on organizational use of computer technology, each state or locality may have a number of its own applicable laws and regulations.Apply the examples provided in the text how the state of Georgia passed
Determine that it is important for IT professionals and information security practitioners to realize that when their organizations do business on the Internet, they do business globally. This is especially true with the advent of the Internet and globalization of the marketplace.Explain that
Compare and contrast laws that are enforceable in the United Kingdom (U.K.) with the ones that have been described in the United States. Ones of importance and described in the text are the following:Computer Misuse Act, 1990: Defines three “computer misuse offenses”: unauthorized access to
Review laws that are currently enforceable in Australia and determine how they are similar yet different to ones that are in place here in the United States. Discuss with students the following laws mentioned in the text as described here:Privacy Act, 1988: Regulates the collection, storage, use,
Explain how the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), created by the World Trade Organization (WTO), introduced intellectual property rules into the multilateral trade system.Outline the five issues that the WTO TRIPS agreement covers, as mentioned in the
Explain how the Digital Millennium Copyright Act (DMCA) is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially through the removal of technological copyright protection measures.Discuss with students how in 1995 the
Justify that many professional groups have explicit rules governing ethical behavior in the workplace. Note that the information technology and security fields do not have a binding code of ethics.Detail that professional associations (such as the Association for Computing Machinery and the
Review the findings from the study and draw conclusions from the following observations from the study results:Overall, most of the nations studied had similar attitudes toward software piracy.Statistically speaking, only the United States and the Netherlands had attitudes that differed
Demonstrate that there was a common theme between countries where participants condemned viruses, hacking, and other forms of system abuse.Establish the fact, though, that there were different degrees of tolerance among groups measured.
Emphasize that employees must be trained and kept aware of many topics related to information security, not the least of which are the expected behaviors of an ethical employee and cultural differences that can make it difficult to determine what is and is not ethical, especially when it comes to
Explain that most IT and information security organizations have their own codes of ethics, and what is contained in them may vary from one another.
Distinguish to students that(ISC)2is a nonprofit organization that focuses on the development and implementation of information security certifications and credentials. Its code of ethics is primarily designed for information security individuals who have earned a certification from the
Describe the System Administration, Networking, and Security Institute (SANS), a professional organization with a large membership group, with over 153,000 members since its inception in 1989,that is dedicated to the protection of information and systems.Report that SANS offers a set of
Relate that this organization was originally known as the Information Systems Audit and Control Association. ISACA is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals.Justify that its main purpose is to
Comment that this organization is a nonprofit society of information security professionals. As a professional association, its primary mission is to bring together qualified practitioners of information security for information exchange and educational development.Apply the fact that ISSA also
Explain that this is a security organization founded by Jay Bavisi that offers a variety of security, technical, and managerial certifications. This includes its renowned Certified Ethical Hacker (CEH) and CCISO certifications.Emphasize the organization promotes a 19-point code of ethics for its
Discuss the key U.S. federal agencies charged with the protection of American information resources and the investigation of threats to, or attacks on, these resources.
Describe the Department of Homeland Security (DHS), created in 2003 through the Homeland Security Act of 2002, which was passed in response to the events of September 11, 2001.Outline the structure of DHS and its five directorates or divisions through which it carries out its mission of protecting
Explain that the U.S. Computer Emergency Readiness Team (US-CERT) is a division of DHS’s National Cybersecurity and Communications Integration Center (NCCIC).
Describe the U.S. Secret Service, which was relocated from the Department of the Treasury to the DHS in 2002. They have been charged with the responsibility of safeguarding the nation’s financial infrastructure and payment systems to preserve the integrity of the economy.Discuss the strategic
Recognize that this group is the primary U.S. law enforcement agency, and it investigates both traditional crimes and cybercrimes, as well as works with the U.S. Attorney’s Office to prosecute suspects under federal law (the U.S. Code).Review the focus and priorities of this agency and that
Explain that the national Infra Gard program began as a cooperative effort between the FBI’s Cleveland field office and local technology professionals, and it was established in January 2001.Summarize the following points made in the text with respect to this program, which is used to share
Identify the purpose of the NSA and what it is responsible for within the federal government. Discuss the following with students with respect to this agency:The NSA is responsible for signals intelligence and information system security.Explain that the IAD is responsible for the protection of
Define what an incident response is and how it is similar or different to an adverse event.Express concern that incident responses depend on the quick, efficient, and timely containment of an issue that occurs and the resolution of it.Summarize the purpose of incident response planning (IR plan)
True or False: The three communities of interest are general management, operations management, and information security management.
Discuss the view that information security is unlike any other aspect of information technology. The primary mission is to ensure things stay the way they are. Point out that if there were no threats to information and systems, we could focus on improving systems that support the
Hackers of limited skill who use expertly written software to attack a system are known as which of the following?a. Cyber terroristsb. Script kiddiesc. Jail breakersd. Social engineers
Explain that without the underlying business to generate revenue and use information, it has a likelihood to lose value and the need for it would go to zero.Stress that the decisions that need to be made with respect to information security and their assets should be done carefully and
Which of the following occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it?a. Information extortionb. Technological extortionc. Insider tradingd. Information hoarding
Discuss the fact that general management, IT management, and information security management are responsible for implementing information security to protect the ability of the organization to function.Relate to students that information security is a management issue in addition to a technical
Which type of attacker will hack systems to conduct terrorist activities via network or Internet pathways?a. Cyber attackersb. Electronic terroristsc. Cyberterroristsd. Electronic hackers
Stress to students that they should understand that many organizations realize that one of their most valuable assets is their data. Without data, an organization loses its record of transactions and/or its ability to deliver value to its customers.Explain the concept of data security. This concept
True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.
Distinguish an understanding that a modern organization needs to create an environment that protects and safeguards applications, specifically ones that are important elements to the infrastructure of a firm—operating systems, platforms, operational applications, e-mail, instant messaging
True or False: When looking at forces of nature that could cause destruction or damage to information systems, electrostatic discharge (ESD) is not considered to be one of them.
Relate to students that as an organization grows, so does its need for more robust technologies and commercial-grade solutions.Explain the example that is provided in the textbook that lists core components of security technologies (a commercial-grade, unified security architecture device, complete
Using a known or previously installed access mechanism is known as which of the following?a. Hidden bombb. Vectorc. Spoofd. Back door
Remind students that to make sound decisions about information security as well as to create and enforce policies, management must be informed of the various kinds of threats facing the organization and its applications, data, and information systems.Explain that a threat is an object, person, or
True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof.
True or False: Warnings of attacks that are not valid are usually called hoaxes.
What is another name for a man-in-the-middle attack?a. TCP hijackingb. Mail bombingc. Spoofingd. Denial of service
Introduce students to the CAPEC Web site, which can be used by security professionals to understand attacks.Explain that this resource is a good tool for information security professionals to use to gain additional insight on how attacks occur procedurally.
Which of the following is an application error that occurs when more data is sent to a program buffer than it is designed to handle?a. Buffer underrunb. Buffer overrunc. Heap overflowd. Heap attack
True or False: A SQL injection occurs when developers fail to properly validate user input before using it to query a relational database.
Explain that many organizations create or support the development of intellectual property (IP) as part of their business operations. Intellectual property is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas.”Recall that intellectual
True or False: The Domain Name System (DNS) is a function of the World Wide Web that converts a URL (Uniform Resource Locator) such as www.course.com into the IP address of the Web server host.
Emphasize to students that the most common IP breaches involve the unlawful use or duplication of software-based intellectual property, known as software piracy.Outline that in addition to the laws surrounding software piracy, two watchdog organizations investigate allegations of software abuse:
Discuss that enforcement of copyright laws has been attempted through several technical security mechanisms, such as digital watermarks, embedded code, and copyright codes.Identify that online registrations combat piracy because users must register their software to complete the installation
Summarize that concerns in this category represent situations in which a product or service is not delivered to the organization as expected.Explain that the organization’s information system depends on the successful operation of many interdependent support systems, including power grids,
Describe communications and other service provider issues: other utility services can impact organizations as well. Among these are telephone, water, wastewater, trash pickup, cable television, natural or propane gas, and custodial services. The loss of these services can impair the ability of an
Describe power irregularities: irregularities from power utilities are common and can lead to fluctuations, such as power excesses, power shortages, and power losses. In the United States, we are “fed” 120-volt, 60-cycle power usually through 15-amp and 20-amp circuits.Explain that voltage
Emphasize that an attack is a deliberate act that exploits a vulnerability to compromise a controlled system. This attack can consist of specially crafted software that attackers trick users into installing on their systems.State that the most common form of software attacks is malware, viruses,
Explain that the Council of Europe adopted the Convention on Cybercrime in 2001. It provides for the creation of an international task force to oversee a range of security functions associated with Internet activities for standardized technology laws across international borders. It also attempts
What is the term called for which actions taken by management specify the organization's efforts and actions if an adverse event becomes an incident or disaster?a. CSIRT planb. Contingency planningc. Business continuity pland. Business process
Emphasize that the purpose of this module focuses on plants that are made for adverse events and when the technologies an organization uses are disrupted, and business comes to a halt.Stress that often the information technology (IT) and information security (InfoSec) communities assess the entire
Which of the following is NOT a stage as described in NIST’s SP 800-34, Rev. 1?a. Determine mission/business process and recovery critically.b. Identify resource requirements.c. Identify recovery priorities for system requirements.d. There is no wrong answer, as these are the three stages
Providing customer billing as mentioned in the text is an example of what?a. Potential incident that can occur in an organizationb. Additional resource detailc. Mission/business processd. Description and estimated cost
Define the purpose of the business impact analysis (BIA). Stress that this document is the first major component of the CP process and what it is intended for. As mentioned in the text, it serves as an investigation and assessment of the impact that various adverse events can have on the
True or False: The NIST Cybersecurity Framework has a total of four processes that are cyclical in nature.
True or False: Remote journaling is the process in which an organization can transfer live transactions to an off-site facility.
True or False: An alert roster often is done one of two ways: sequentially or hierarchically.
Recall that the final step of the BIA is to prioritize the resources associated with the mission/business processes. This is best done to determine what needs to be recovered first, even with the most critical processes at hand.Relate that multiple weighted tables can and may need to be created so
Which of the following is NOT part of the disaster recovery policy?a. Financingb. Purposec. Exercise and testing schedulesd. Scope
Identify that the CP team should work to develop the policy environment that will enable the BIA process and should provide specific policy guidance toward authoring the creation of each of the planning components (IR, DR, and BC) before documents are created.Describe the nature of documents that
What type of data acquisition is done where information is taken off as a protected copy while a system is actively live for the purpose of business continuity?a. Offlineb. Onlinec. Transitoryd. Slow-dripping
A ________ is sworn testimony that certain facts are in the possession of an investigating officer, and they warrant the examination of specific items located in a location.a. Memorandumb. Piece of evidencec. Legal directived. Affidavit
In a ________, the organization creates a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and is expected to react as if it had occurred.a. Desk checkb. Simulationc. Full-interruption testd. Structured walk-through
Which of the following is a primary responsibility of the CPMT?a. Conducting a building walk-through during an emergencyb. Securing financing so that physical infrastructure can be immediately replacedc. Coordinating with emergency services in the event someone is injured or killedd. Gathering
True or False: The term chain of evidence is also known as a chain of custody.
Stress that by hackers posing as friendly help-desk associates or repair techs, they have an easy inroad into servers and systems even if they resolve a user’s issue.Critique the scenario where hackers can work inside an organization and even at a help desk using this method to gain systems
Detail the net effects a flood can do to a facility and computing equipment. On top of damaging the systems, building access may also be compromised.Explain that this specific threat often may be mitigated with flood insurance or business interruption insurance. This is especially important if the
Present that an earthquake can cause direct damage to information system equipment and/or the facilities that house the equipment.Stress that not only physical structures are at risk. Give the example in the text of a large earthquake off the coast of Taiwan that severed underwater communications
Illustrate what a lightning strike is. It is an abrupt, discontinuous natural electric discharge in the atmosphere.Recognize that lightning strikes not only can damage all or part of an information system but also cause building damage, fires, or other damage.Emphasize proactive measures that can
Relate that these are downward slides of masses of earth, rock, or snow and are sometimes sudden or with minimal notice so evacuations can take place.Direct students to understand the impacts here to buildings that house the systems. Depending on the severity of the incident, they may be destroyed
Contrast the differences between a tornado and wind shear events.Denote that a tornado facility housing the information systems can directly damage all or part of the structure, depending on the strength of the funnel cloud and wind speed.Explain that this brief but impactful type of natural
Compare the difference between a typhoon and a hurricane.Stress that excessive rainfall and high winds from these storms can directly damage all or part of the information system or, more likely, the building that houses it. Organizations in coastal or low-lying areas may suffer flooding as well,
Describe the impact of a tsunami and the severity of impact that just one event may cause.Apply the tsunami that occurred in 2011 as a threat that affected the world directly and indirectly.Explain how in most cases that this threat can sometimes be mitigated with casualty insurance or business
Relate that dust particle buildups and debris inside systems can dramatically reduce the effectiveness and efficiency of the equipment. This often leads to unexpected shutdowns and overheating.Stress that this can often shorten the life of information systems and disrupt normal operations.
Detail the purpose of cyberterrorism and what the United States and other government bodies are doing to combat this.Differentiate between the three examples provided in the text with respect to supposed cyberterrorism attacks and why it is important to be on guard.Relate that some government
Detail the purpose of cyberterrorism and what the United States and other government bodies are doing to combat this.Differentiate between the three examples provided in the text with respect to supposed cyberterrorism attacks and why it is important to be on guard.Relate that some government
Illustrate that one of the best-known hardware failures was the Intel Pentium II chip.Since a simple quotient problem caused systems to crash, the Pentium floating-point division bug (FDIV) led to a public-relations disaster for Intel that resulted in its first-ever chip recall and a loss of more
Summarize that the protection function is done through a set of risk management activities in addition to protection mechanisms, technologies, and tools. Note that these are critical pieces of an overall InfoSec plan.
Stress that this section of the policy provides strict guidance with respect to where technology is prohibited to be used.Predict the fact that an organization and its employees cannot be penalized if a particular use is strictly prohibited.
Explain that this section provides focus on the users’ relations to systems management.Emphasize that it is important to identify all responsibilities delegated to both users and systems administrators to avoid confusion.
Explain that this is a new practice in the workplace, which can assist with some of the busywork policy managers have to deal with.Outline that automation streamlines the repetitive steps of writing policy, tracking the workflow of policy approvals, publishing policy once it is written and
Emphasize that everyone in an organization needs to be trained and aware of information security, but not every member of the organization needs a formal degree or certificate in information security.Discuss that when formal education for appropriate individuals in security is needed, with the
Relate how security training involves providing members of the organization with detailed information and hands-on instruction designed to prepare them to perform their duties securely.Present how management of information security can develop customized in-house training or outsource the training
Stress that a security awareness program is one of the least frequently implemented but most beneficial programs in an organization.Explain that a security awareness program is designed to keep information security at the forefront of the users’ minds as they work daily. This helps stimulate them
Recognize that this is an excellent reference and guide for a security manager or administrator in the routine management of information security.Stress that it, however, provides little guidance for the design and implementation of new security systems, and therefore should be used only as a
Explain that this threat represents a well-known and broad category of electronic and human activities that breach the confidentiality of information.Establish that when an unauthorized individual gains access to the information an organization is trying to protect, that act is categorized as a
Showing 500 - 600
of 745
1
2
3
4
5
6
7
8
Step by Step Answers