OtherPapers.com - Other Term Papers and Free Essays
Search

Security Case

Essay by   •  August 19, 2012  •  Study Guide  •  316 Words (2 Pages)  •  2,194 Views

Essay Preview: Security Case

Report this essay
Page 1 of 2

Chapter 1 Solutions File

Review Questions

1. What is the difference between a threat agent and a threat?

"Threat: An object, person, or other entity that represents a constant danger to an asset."

2. What is the difference between vulnerability and exposure?

"Vulnerability is a state in which an object can possibly be affected by a force or another object or even a situation but not necessarily is or will be affected. Exposure is a state in which an object is already being affected by a force, an object or a situation."

3. What is a hacker? A person who uses a computer system without a specific, constructive purpose or without proper authorization. What is a phreaker? A person who can manipulate a telephone system to allow one to make calls without paying for them.

4. What are the three components of the C.I.A. triangle? Confidentiality, integrity, and availability.

What are they used for? Availability- "The information is accessible by authorized users without interference or obstruction, and they receive it in the required format."

Integrity -"The information remains whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state." Confidentiality- "The information is protected from exposure or disclosure to unauthorized individuals or systems. This means that only those with the rights and privileges to access information are able to do so. "

5. If the C.I.A. triangle no longer adequately addresses the constantly changing environment of the information technology industry, why is it still commonly used in security?

"Although the C.I.A. triangle model no longer adequately addresses the constantly changing environment needs of information security, it's three characteristics of information (confidentiality, integrity, availability) is still important today as it was before. In addition, the C.I.A. triangle terminology is still commonly used for the breadth of material that is based on it. (.8-9)"

...

...

Download as:   txt (2 Kb)   pdf (53.7 Kb)   docx (9.2 Kb)  
Continue for 1 more page »
Only available on OtherPapers.com
Citation Generator

(2012, 08). Security Case. OtherPapers.com. Retrieved 08, 2012, from https://www.otherpapers.com/essay/Security-Case/32616.html

"Security Case" OtherPapers.com. 08 2012. 2012. 08 2012 <https://www.otherpapers.com/essay/Security-Case/32616.html>.

"Security Case." OtherPapers.com. OtherPapers.com, 08 2012. Web. 08 2012. <https://www.otherpapers.com/essay/Security-Case/32616.html>.

"Security Case." OtherPapers.com. 08, 2012. Accessed 08, 2012. https://www.otherpapers.com/essay/Security-Case/32616.html.