How is infrastructure protection assuring the security of utility services related to information security?

  • School Cambridge
  • Course Title ENGLISH 2012
  • Pages 4

This preview shows page 1 - 2 out of 4 pages.

1.How is infrastructure protection (assuring the security of utility services) related toinformation security?

Get answer to your question and much more

2.Discuss the six components of an information system. Which are most directlyaffected by the study of computer security?

Get answer to your question and much more

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

How is infrastructure protection assuring the security of utility services related to information security?

Chapter 1 Review Questions and E5

1. what is the difference between a threat agent and a threat?

Threat: a category of objects, persons, or other entities that presents a danger to an asset Threat agent: the specific instance or component of a threat

2. what is the difference between vulnerability and exposure?

Vulnerability: a weakness or fault in a system or protection mechanism that opens it to attack or damage. Exposure: a condition or state of being exposed. It exists when a vulnerability known to an attacker is present.

3. how is infrastructure protection (assuring the security of utility services) related to information security?

Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system.

4. what type of security was dominant in the early years of computing?

The type of security was dominant in the early years of computing security was entirely physical security. And MULTICS was first noteworthy operating system to integrate security in to its core system.

5. what are the three components of the C.I.A triangle? what are they used for?

1. confidentiality: protect information from disclosure or exposure to unauthorized individuals or systems 2. integrity: when information is whole, complete and uncorrupted 3. availiability: allows authorized users to access information without intereference or obstruction and to receive it in the required format C.I.A. : the industry standard for computer security since the development of the mainframe

6. if the C.I.A. triangle is incomplete, why is it so commonly used in security?

The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major


You May Also Find These Documents Helpful

  • Information Security Review Questions CH1

    Chapter 1 - Review Questions Answer each question completely. This information is from Chapter 1 in your textbook. Submit your completed file through the ASGN_C1 assignment in Blackboard. For information on how to submit assignments, refer to SUBMITTING ASSIGNMENTS IN BLACKBOARD located in Course Materials. 1. What is the difference between a threat agent and a threat? A threat is a general term used to describe a category of items that present a risk in jeopardizing the safety of an asset…

    • 982 Words
    • 4 Pages

  • Review Questions For Chap 2 1

    Remedial Physics------------------------------------Review Questions -------------------------------------Chapter 2 Quantitative Problems 1) An object moves 15.0 m north and then 11.0 m south. Find both the distance traveled and the magnitude of the displacement vector. A) 6.0 m, 26.0 m B) 26.0 m, 4.0 m C) 26.0 m, 26.0 m D) 4.0 m, 4.0 m 2) A boat can move at 30 km/h in still water. How long will it take to move 12 km upstream in a river flowing…

    • 980 Words
    • 3 Pages

  • Chap 1 - 5

    Chapter 1 INTRODUCTION Background of the Study There are lots of herbal plants which are already known for its uses. Binayuyu (Antidesma ghaesembilla Gaertn var. ghaesembilla) is a herbal plant used by B’laan tribes in the southern part of the Philippines. It is said that it can cure stomach ache and helps to lower blood sugar. Artemia is a genus of aquatic crustaceans known as brine shrimp. Artemia, the only genus in the family Artemiidae, has changed little externally since the Triassic period…

    • 3513 Words
    • 15 Pages

  • Mis(Laudon) Chap 5 Review Questions

    ISYS104 Tutorial – week 6 Review Questions 1. What is IT infrastructure and what are its components? Define IT infrastructure from both a technology and a services perspective. • Technical perspective is defined as the shared technology resources that provide the platform for the firm’s specific information system applications. It consists of a set of physical devices and software applications that are required to operate the entire enterprise. • Service perspective is defined as providing…

    • 3432 Words
    • 14 Pages

  • Unit 5 Exercise 1 Security

    C D B A B E D A & D A & C A & D C C & D B A & C A A & B D C B C From: System Admin To: Manager I have read the issues and I would recommend these steps to better manage our business workstations. This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator. Team leads need to have access to their files from any workstation. Team leads will be assigned standard roaming users.. Due…

    • 308 Words
    • 2 Pages

  • Chap 5

    Chapter 5 Activity-Based Costing and Customer Profitability Analysis Cases |5-1 |Blue Ridge Manufacturing (Activity-Based Costing for Marketing Channels) | |5-2 |Columbo Soft-Serve Frozen Yogurt: Using Activity Based Costing To Assess Channel/Customer Profitability | |5-3 |Wilson Electronics (A) | |5-4 |Wilson…

    • 33150 Words
    • 133 Pages

  • Nt1230 Unit 5 Exercise 1 Security Report

    UNIT 5 EXERCISE 1: SECURITY Alexander Septon October 21, 2014 NT1230 FROM: Systems Administrator TO: Manager First of all, glad to hear from you again after giving you some pointers regarding those interns and your merchandising team. Now regarding your dilemma with deciding over buying hardware firewalls and antivirus applications… stop. There is no need to go and shill extra money to buy hardware for any sort of countermeasures, no matter how noble your goals may seem. Windows 7 already…

    • 190 Words
    • 1 Page

  • Security Investment Quiz Chap 1

    Course | SECURITIES INVEST (Fa12) | Test | Chapter 1 self assessment | Started | 9/8/12 4:38 PM | Submitted | 9/8/12 5:00 PM | Status | Completed | Score | 34 out of 34 points | Time Elapsed | 21 minutes. | Instructions | | * Question 1 1 out of 1 points | | | Corporate shareholders are best protected from incompetent management decisions by Answer | | | | | Selected Answer: | the threat of takeover by other firms. | Correct Answer: | the threat of takeover…

    • 2276 Words
    • 10 Pages

  • Information Security Question Paper

    Subject: Computer and Information Security Course: M.Sc. Tech ITM Duration: 90 Minutes Max. Marks: 50 1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks) 2. Explain RC4 algorithm. Encrypt the Message “HI” using RC4 algorithm, with four states and 2 bit key values are [2,5] ASCII value for H – 1001000I – 1001001 (5+5=10 Marks) 3. a. Find the plaintext from the ciphertext using cesar…

    • 713 Words
    • 3 Pages

  • Finn Chap 1-5

    How and why does Twain establish Huck’s voice as storyteller? What do we learn about Huck from what he reveals of other characters’ assessments of him? Twain establishes Huck’s voice as storyteller in the very beginning of the story. He establishes it by Huck’s introduction of the book that must be read that is written by Twain. From the beginning of the story the reader can learn about Huck from the Widows expressions over Huck. The reader can learn that Huck is kind of free spirited and more simple…

    • 680 Words
    • 3 Pages

What is information security what essential protection must be in place to protect information systems from danger?

Information security protects sensitive information from unauthorized activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property.

What does information security protect us and our information systems from?

The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability. synonymous withIT Security.

What type of security is dominant in the early years of computing?

What type of security was dominant in the early years of computing? Physical security ONLY.

Why is information security important and what types of information are we concerned with protecting?

It protects the organisation's ability to function. It enables the safe operation of applications implemented on the organisation's IT systems. It protects the data the organisation collects and uses. It safeguards the technology the organisation uses.