Question

1- In your own words, discuss why information security is a management issue. What is management...

1- In your own words, discuss why information security is a management issue. What is management able to do that technology can not?

2- Why do employees constitute one of the greatest threats to information security?

3-What is the difference between a threat and an attack?

Homework Answers

Answer #1

1) implementing information security has more to do with management than with technology managing information security has more to do with policy and its enforcement than with technology of its implementation . organization communities of interest must address information security in terms of business impact and the cost of business interruption , rather than focusing on security as technical problem .

2) Employees constitute one of the greatest threats to information security , as the individual closest to the organizational data .Employees mistakes can easily lead to the following : revelation of a classified data , entry to erroneous data ,accidental deletion or modification of data , storage of data in unprotected areas and failure to protect information .

3) a threat is category of objects , persons , or other entities that represents a constsnt danger to an asset

   an attack is an act or event that exploits vulnerability and main difference between threat and attack is a threat can be either intentional or unintentional where as an attack is intentional . threat is a circumstance that has potential to cause loss or damage whereas attack is attempted to cause damage . threat to the information system doesnt mean information was altered or damaged but attack on the information system means there might be a chance to alter , damage , or obtain information when attack was successful.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
WEEK 9 ASSIGNMENT#6 DISCUSS THE FOLLOWING IN YOUR OWN WORDS. 1: What are the threats to...
WEEK 9 ASSIGNMENT#6 DISCUSS THE FOLLOWING IN YOUR OWN WORDS. 1: What are the threats to Samsung Galaxy Note 7?
250 words, in your own words Why is the goal of financial management to maximize the...
250 words, in your own words Why is the goal of financial management to maximize the current value of the company’s stock? In other words, why isn’t the goal to maximize the future value?
250 words, in your own words Why is the goal of financial management to maximize the...
250 words, in your own words Why is the goal of financial management to maximize the current value of the company’s stock? In other words, why isn’t the goal to maximize the future value?
In your own words, define management and leadership. What do you feel are the differences between...
In your own words, define management and leadership. What do you feel are the differences between the two terms?
Please write in your own words 2. Discuss the following related to property management process: a....
Please write in your own words 2. Discuss the following related to property management process: a. Inherent risk assessment b. Control risk assessment c. Analytical procedures
In Chapter 1, a challenge for the modern manager is the issue of knowledge management. Please...
In Chapter 1, a challenge for the modern manager is the issue of knowledge management. Please tell me: a) what is knowledge management? As a hint, define this in your own words, NOT using the textbook’s words! I’ll subtract points for using the terms “harnessing intellectual resources.” b) Why is knowledge management a challenge for managers, and why might employees feel disinclined to “give up” their knowledge? c) What is an example of a way a company might use knowledge...
.Universities are constantly facing a variety of cyber security threats, including disruption to the functioning of...
.Universities are constantly facing a variety of cyber security threats, including disruption to the functioning of their networks, targeted attempts to obtain valuable and personal information, and advanced threats that aim to exploit the sector’s place in economic development. Digital information is at the core of a university’s diverse network of departments and activities. The main challenge a university faces, in terms of cyber security, is defending its critical data from potential corruption caused by modern cyber threats. The current...
in your own words describe the fundamental difference between fractional and steam distillation. Address this issue...
in your own words describe the fundamental difference between fractional and steam distillation. Address this issue from an apparatus and theoretical perspective.
1. Explain in your own words why full employment is not defined as zero unemployment? 2....
1. Explain in your own words why full employment is not defined as zero unemployment? 2. Explain in your own words why Congress choose 3% inflation rather than zero inflation as benchmark for price stability? 3. Illustrate (make a diagram) and briefly discuss the major macro outcome and their determinants. 4. Explain in your own words how Classical and Keynesian macro views differ. 5. Explain in your own words why aggregate demand curve is downward sloping? Include graph with your...
Discuss what this quote means in your own words in 4-5 sentences."Youth with disabilities need to...
Discuss what this quote means in your own words in 4-5 sentences."Youth with disabilities need to redefine what their diagnosis means to them and one way they can do that is through experiencing disability culture and disability pride."
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT