Preview

Nt1330 Unit 3 Essay

Good Essays
Open Document
Open Document
764 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Essay
2. What is the difference between vulnerability and exposure?

Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).

4. What type of security was dominant in the early years of computing?

Security, in its earliest years, consisted of mainly physical security, the need to safeguard the equipment itself. During the next decade, when ARPANET grew in use, more advanced security was needed. This led to the creation of MULTICS, an operating system with security being its main concern. From MULTICS spawned the UNIX operating system which did not require the same in-depth levels of security. In the early 1970's the password function was implemented as one of the first security measures. As computers and networking became more wide spread, during the 1990's, some security measures were implemented though they were seen as a low priority. Because of the lack of security in the start, we now have
…show more content…
If the C.I.A. triangle is incomplete, why is it so commonly used in security?

The C.I.A. triangle is the industry standard for computer security. It has existed since the development of the mainframe. Because it is the industry standard it is still used today because it's characteristics; confidentiality, integrity, and availability are still just as important in today's society. However, it no longer addresses the full breadth of security concerns faced today, so it instead serves as a foundation for a more advanced system, known as the expanded C.I.A. triangle.

8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The nature of the Pentium flaw was in the floating – point math subsection. In certain conditions, low order bits of the result of floating-point division operations would be incorrect. This would lead to an error that will quickly compound in operations to larger errors when future calculations were completed.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Final Exam Review

    • 687 Words
    • 3 Pages

    1. What unit of measurement is a tenfold logarithmic ratio of power output to power input?…

    • 687 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called “levels”. These levels map loosely to the Open Systems Interconnect (OSI) 7 layer model defined by the international standards organisation .…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    In scenario 1 you can see electrical equipment plugged in to the mains, which means electricity at work regulation 1989 is applied to this room. The electricity at work 1989 states that all electrical system and circuits should be maintained to make sure that the device runs properly and that there is no faults that could cause harm to user, also before working on a device you should isolate it which mean having an air gap so that electricity does not flow through it while doing repair or maintenance. Another feature of electricity at work 1989 is that all device should go through inspection regularly by a qualified electrician, to look for broken sockets, lose wires and crushed cables, this is to prevent harm to user. All defects should be reported when noticed to make sure they are fixed as soon as possible, when defects are noticed place a ‘DO NOT USE’…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    The differences are: vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell Partners. Retrieved February 19, 2014, from http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/…

    • 649 Words
    • 3 Pages
    Good Essays
  • Good Essays

    System. This model helps the organization to prevent security breaches and gives them an amount of time to detect where and when an attack has occurred. If an organization does not have this model to protect their assets their integrity could be destroyed, their systems could get attacked by viruses and cyber terrorism.…

    • 915 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:…

    • 2132 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Password protection is highly important when talking about Information security systems. Passwords are the first step in keeping out hackers and unwanted guests from entering your security systems. All organizations will require passwords to enter their security systems. Also when dealing with passwords they will also require you to have different symbols. Things such as one capital letter or a total of three numbers in the password or even adding a special character may be a requirement when making a password for the security system.…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Describe any four (4) threats to information security and explain any two (2) methods of defense mechanism used to protect information systems.…

    • 1958 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Virtual Learning Environment

    • 4651 Words
    • 19 Pages

    Why Security? Essential Terminologies Elements of Security The Security, Functionality, and Ease of Use Triangle What Does a Malicious Hacker Do? o Reconnaissance o Scanning o Gaining access o Maintaining access o Covering Tracks…

    • 4651 Words
    • 19 Pages
    Satisfactory Essays