Information Security Chap 1-2 Essays

3979 Words Oct 17th, 2013 16 Pages
Principles of Information security textbook problems Chapter 1 & 2 …
Study this se t o nline at: http://www.cram.co m/cards/136 20 58

What is the dif f erence between a threat and a threat agent?

A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack.

What is the dif f erence between vulnerability and exposure?

Vu l n e r a b i l i ty i s a fa u l t wi ti n th e s ys te m , s u ch a s s o ftwa r e p a cka g e fl a ws , u n l o cke d d o o r s o r a n u n p r o te cte d s ys te m p o r t. It l e a ve s th i n g s o p e n to a n a tta ck o r d a m a g e . Exp o s u r e i s a s i n g l e i n s ta n ce wh e n a s ys te m i s o p e n to d a m a g e . Vu l n e r a b i l i ti e s ca n i n tu
…show more content…
How are they used in the study of computer security?

Ava i l a b i l i ty: Au th o ri s e d u s e rs c a n a c c e s s th e i n fo rma ti o n Ac c u ra c y: fre e fro m e rro rs Au th e n ti c i ty: g e n u i n e C o n fi d e n ti a l i ty: p re ve n ti n g d i s c l o s u re to u n a u th o ri z e d i n d i vi d u a l s . In te g ri ty: wh o l e a n d u n c o rru p te d . U ti l i ty: h a s a va l u e fo r s o me p u rp o s e Po s s e s s i o n : O wn e rs h i p

Identify the five components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?

Software, Hardware, Data, People, Procedures

Principles of Information security textbook problems Chapter 1 & 2 …
Study this se t o nline at: http://www.cram.co m/cards/136 20 58

In the history of the study of computer security, what system is the father of almost all modern multiuser systems?

Mainframe computer systems

What paper is the foundation of all subsequent studies of computer security?

Rand Report R-609
Bottom up lacks a number of critical features s uch as participant s upport and organiz ational s taying power, whereas top down has s trong upper management s upport, dedicated funding, clear planning and the oppertunity to influence organiz ations

Related Documents