Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Information Security questions

CHAPTER 1
1.    What is the difference between a threat agent and a threat?

2.    What is the difference between vulnerability and exposure?

3.    How is infrastructure protection (assuring the security of utility services) related to information security?

4.    What type of security was dominant in the early years of computing?

5.    What are the three components of the C.I.A. triad? What are they used for?

6.    If the C.I.A. triad is incomplete, why is it so commonly used in security?

Chapter 2
1.    Why is information security a management problem? What can management do that technology cannot?

2.    Why is data the most important asset an organization possesses? What other assets in the organization require protection?
 
3.    Which management groups are responsible for implementing information security to protect the organizations ability to function?

4.    Has the implementation of networking technology created more or less risk for businesses that use information technology? Why?

5.    What is information extortion? Describe how such an attack can cause losses, using an example not found in the text.

6.    Why are employees one of the greatest threats to information security?

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes