Question: 1 . What is the difference between vulnerability and exposure? o Answer: 2 . What is a loss in the context of information security? o
What is the difference between vulnerability and exposure?
o Answer:
What is a loss in the context of information security?
o Answer:
What type of security was dominant in the early years of computing?
o Answer:
What are the three components of the CI.A triad? What are they used for?
o Answer:
If the CI.A triad is incomplete, why is it so commonly used in security?
o Answer:
Describe the critical characteristics of information. How are they used in the study of computer security?
o Answer:
Identify the components of an information system. Which of the components are most directly affected by the study of computer security?
o Answer:
What is the McCumber Cube, and what purpose does it serve?
o Answer:
Which paper is the foundation of all subsequent studies of computer security?
o Answer:
Why is the topdown approach to information security superior to the bottomup approach?
o Answer:
Describe the need for balance between information security and access to information in information systems.
o Answer:
How can the practice of information security be described as both an art and a science? How does the view of security as a social science influence its practice?
o Answer:
Who is ultimately responsible for the security of information in the organization?
o Answer:
What is the relationship between the MULTICS project and the early development of computer security?
o Answer:
How has computer security evolved into modern information security?
o Answer:
What was important about RAND Report R
o Answer:
Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these decisions are carried out?
o Answer:
Who should lead a security team? Should the approach to security be more managerial or technical?
o Answer:
Besides the champion and team leader, who should serve on an information security project team?
o Answer:
Module : The Need for Security Review Questions
Why is information security a management problem? What can management do that technology cannot?
o Answer:
Why is data the most important asset an organization possesses? What other assets in the organization require protection?
o Answer:
Which management groups are responsible for implementing information security to protect the organizations ability to function?
o Answer:
Has the implementation of networking technology, such as the cloud, created more or less risk for businesses that use information technology? Why?
o Answer:
What is information extortion? Describe how such an attack can cause losses, using an example not found in the text.
o Answer:
Why are employees among the greatest threats to information security?
o Answer:
How can you protect against shoulder surfing?
o Answer:
How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
o Answer:
What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection against each differ?
o Answer:
What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?
o Answer:
Why does polymorphism cause greater concern than traditional malware? How does it affect detection?
o Answer:
What is the most common violation of intellectual property? How does an organization protect against it What agencies fight it
o Answer:
What are the various forces of nature? Which type might be of greatest concern to an organization in Las Vegas? Jakarta? Oklahoma City? Amsterdam? Miami? Tokyo?
o Answer:
How is technological obsolescence a threat to information security? How can an organization protect against it
o Answer:
Does the intellectual property owned by an organization usually have value? If so how can attackers threaten that value?
o Answer:
What are the types of password attacks? What can a systems administrator do to protect against them?
o Answer:
What is the difference between a denialofservice attack and a distributed denialofservice attack? Which is more dangerous? Why?
o Answer:
For a sniffer attack to succeed, what must the attacker do How can an attacker gain access to a network to use the sniffer system?
o Answer:
What methods would a social engineering hacker use to gain information about a users login ID and password? How would these methods differ depending on the users position in the company?
o Answer:
What is a buffer overflow, and how is it used against a Web server?
o Answer:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
