preview

Information Security Chap 1 Review Questions and Exercise 5 Essay

Satisfactory Essays

Chapter 1 Review Questions and E5

1. what is the difference between a threat agent and a threat?

Threat: a category of objects, persons, or other entities that presents a danger to an asset Threat agent: the specific instance or component of a threat

2. what is the difference between vulnerability and exposure?

Vulnerability: a weakness or fault in a system or protection mechanism that opens it to attack or damage. Exposure: a condition or state of being exposed. It exists when a vulnerability known to an attacker is present.

3. how is infrastructure protection (assuring the security of utility services) related to information security?

Information security is the protection of information and it is …show more content…

Faults are a precise interaction of hardware and software that can be fixed given enough time.

15. who is ultimately responsible for the security of information in the organization?

The Cheif Information Security Officer (CISO)

16. what is the relationship between the MULTICS project in the early development of computer security?

It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security.

17. how has computer security evolved into modern information security?

In the early days before ARPANET machines were only physically secured. After ARPANET it was realised that this was just one componen.

18. what was important Rand Report R-609?

RR609 was the first widly recognized published document to identify the role of management and policy issues in computer security.

19. who decides how and when data in an organzation will be used or controlled? who is responsible for seeing that these wishes are carried out?

Control and use of data in the Data owners are responsible for how and when data will be used, Data users are working with the data in their daily jobs.

20. who should lead the security team? should the approach to security be more managerial or technical?

A project manager with information security technical

Get Access