Show
This preview shows page 1 - 2 out of 4 pages. 1.How is infrastructure protection (assuring the security of utility services) related toinformation security?
Get answer to your question and much more 2.Discuss the six components of an information system. Which are most directlyaffected by the study of computer security? Get answer to your question and much more Upload your study docs or become a Course Hero member to access this document Upload your study docs or become a Course Hero member to access this document End of preview. Want to read all 4 pages? Upload your study docs or become a Course Hero member to access this document Chapter 1 Review Questions and E5 1. what is the difference between a threat agent and a threat? Threat: a category of objects, persons, or other entities that presents a danger to an asset Threat agent: the specific instance or component of a threat 2. what is the difference between vulnerability and exposure? Vulnerability: a weakness or fault in a system or protection mechanism that opens it to attack or damage. Exposure: a condition or state of being exposed. It exists when a vulnerability known to an attacker is present. 3. how is infrastructure protection (assuring the security of utility services) related to information security? Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system. 4. what type of security was dominant in the early years of computing? The type of security was dominant in the early years of computing security was entirely physical security. And MULTICS was first noteworthy operating system to integrate security in to its core system. 5. what are the three components of the C.I.A triangle? what are they used for? 1. confidentiality: protect information from disclosure or exposure to unauthorized individuals or systems 2. integrity: when information is whole, complete and uncorrupted 3. availiability: allows authorized users to access information without intereference or obstruction and to receive it in the required format C.I.A. : the industry standard for computer security since the development of the mainframe 6. if the C.I.A. triangle is incomplete, why is it so commonly used in security? The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major You May Also Find These Documents Helpful
Popular EssaysWhat is information security what essential protection must be in place to protect information systems from danger?Information security protects sensitive information from unauthorized activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property.
What does information security protect us and our information systems from?The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability. synonymous withIT Security.
What type of security is dominant in the early years of computing?What type of security was dominant in the early years of computing? Physical security ONLY.
Why is information security important and what types of information are we concerned with protecting?It protects the organisation's ability to function. It enables the safe operation of applications implemented on the organisation's IT systems. It protects the data the organisation collects and uses. It safeguards the technology the organisation uses.
|