Preview

Ch02

Satisfactory Essays
Open Document
Open Document
3231 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ch02
Chapter 2: Security of Technical Systems in Organizations: An Introduction

1. True or false?

a. Perpetrators of information systems typically stick to the easiest, simplest means to attack.
b. Principle of easiest penetration suggests that security is impossible because strengthening one weakness might make another more attractive to perpetrators.
c. Modification vulnerability occurs when data is changed.
d. Destruction vulnerability occurs when the hardware, software, or the data is destroyed.
e. Disclosure of data takes place when data is made available to all employees of a firm.
f. Copying of programs, data, or other confidential information can be the results of interception.
g. Interruption occurs when a computer system becomes unavailable for legitimate users.
h. A counterfeit record added to a database is an example of fabrication.
i. Hardware can get destroyed when natural disaster and terrorist arise.
j. More people are involved in hardware protection than in software protection.
k. Value of data is time sensitive.
l. Valuable data should be protected at all cost.
m. Access controls act as means to protect confidentiality of data.
n. Confidentiality loss occurs only after direct disclosure of data.
o. The need to know principle is to ensure confidentiality.
p. The need to know principle works better in business environment than in military environment.
q. The requirement of integrity suggests that all data is present and accounted for, irrespective of it being accurate or correct.
r. Availability attacks are usually the most difficult to detect.
s. Authentication assures that a message is from a real person.
t. Digital signatures can be used to prevent non repudiation.
u. Encrypted messages are unintelligible to unauthorized observers.
v. When design software controls, security controls are always the most important.
w. Simple physical controls, such as ensuring locks on doors, guards at entry doors no longer work in today’s information technology

You May Also Find These Documents Helpful

  • Good Essays

    Ch 3-4 3600

    • 2003 Words
    • 13 Pages

    3. Sylvia, age 17, is claimed by her parents as a dependent. During this year, she had…

    • 2003 Words
    • 13 Pages
    Good Essays
  • Good Essays

    | |Verification: Any data obtained should be able to be verified no matter who obtained it. This goes back to consistency also, no matter who obtains the data the outcome should still be the |…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    You can use the __LDIFDE__ command-line utility to create and modify Active Directory objects. P114…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    answers2e ch02

    • 2317 Words
    • 11 Pages

    Isotopes of the same element differ in the number of the neutrons in their nuclei.…

    • 2317 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    a. The concept of defense-in-depth reflects the fact that security involves the use of a few sophisticated technical controls. (Incorrect. The concept of defense-in-depth is based on the idea that, given enough time and resources, any single control, no matter how sophisticated, can be overcome—therefore, the use of redundant, overlapping controls maximizes security.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    JOUR 371 chapter notes

    • 2505 Words
    • 11 Pages

    C. Pushback stemming from privacy concerns comes in the form of people not knowing they have given consent or objecting when they discover that information about them they thought was private is, in…

    • 2505 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    The following attempts to illustrate when data can be disclosed. This list is not exhaustive.…

    • 5095 Words
    • 21 Pages
    Better Essays
  • Satisfactory Essays

    HA 380 Cultural Interview

    • 480 Words
    • 2 Pages

    9. Whether they provide the details first and then report conclusions or if they report the conclusions and the most important points and then report details only when asked…

    • 480 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b. The Profession of Arms is uniquely expert work in which effectiveness is the ultimate key. Professionals are expected to earn trust through an intense…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    CH 40

    • 778 Words
    • 4 Pages

    Ethics is the study of conduct and character. When it comes to decision making in the health care setting, you will experience differing values between patients, family members, health care providers, and society at large. The use of a standard process when deliberating ethical dilemmas assists nurses when handling ethical issues. Use of a code of ethics provides a foundation for professional nurses.…

    • 778 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NVQ 3 UNIT 37

    • 453 Words
    • 2 Pages

    A good way of maintaining records is on a computer or in a file that can be kept confidential and kept up to date. Records should be updated each time the individuals are seen to. These updates could include:…

    • 453 Words
    • 2 Pages
    Satisfactory Essays