Question

Question One: Basic security concepts and terminology                         (2 marks) Computer security is the protection of...

Question One: Basic security concepts and terminology                        

Computer security is the protection of computer systems and the information infrastructure. Threats can originate from various sources. Describe 2 categories of threats, and provide examples (Answer should not exceed 6 lines).

Question Two: Information Security Models                                    ( 6 marks)

The spheres of security, sphere of use and sphere of protection, illustrate the different sources which constitute risks to information, as well as the layers of defense. Describe 3 layers in the sphere of protection model and describe how those 3 layers can help in protecting the information. (Answer should not exceed 6 lines), (Answer should not exceed 6 lines).

Question Three: Security Planning                                                        

Security planning involves developing information security plans for any organization. Incident Response (IR), Disaster Recovery (DR), and Business Continuity (BC) are usually developed and used by organizations. Explain both the Business Continuity, and Disaster Recovery planning concepts, and include at least 5 sections (headings) from each plan. (Answer should not exceed 6 lines),

Homework Answers

Answer #1

1.THE TWO CATEGORIES OF THREATS ARE:1.MALWARE 2.TROJANS

Malware. Software that performs a malicious task on a target device or network, e.g. corrupting data or taking over a system.

Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is a type of malware that enters a target system looking like one thing, e.g. a standard piece of software, but then lets out the malicious code once inside the host system.

2. 1.Technology: Policies, network level threats and measures, operating system level measures, measures on the platform level of databases, measures and threats within database applications and other applications

2.Physical: physical policies, site characteristics in regard to power, electricity, air conditioning and access

3.Human: Policies, corporate culture and personal ethics.

3.BUSINESS CONTINUITY AND DISASTER RECOVERY: BC and DR are closely related practices that support an organization's ability to remain operational after an adverse event. The goal of BCDR is to limit risk and get an organization running as close to normal as possible after an unexpected interruption. These practices enable an organization to get back on its feet after problems occur, reduce the risk of data loss and reputational harm, and improve operations while decreasing the chance of emergencies.the sections are:1.Policy, purpose, and scope. 2.Goals and objectives. 3.Assumptions. 4.Key roles and responsibilities.5.Business impact analysis (BIA) results.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
State whether each of the following are true or false. Write the number of the question...
State whether each of the following are true or false. Write the number of the question and the answer, e.g. 1.11. True 1.1 A TPS uses simple procedures to record and store day-to-day transactions. 1.2 Contemporary information systems are interfacing with customers and suppliers using electronic commerce technology, CRM, and SCM over the internet. 1.3 Processes represent the data acquired from an information system. 1.4 All stakeholders of an information system share the same perspective of the system. 1.5 An...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6 questions should be asked? What is meant by the term “chain of custody”? When can it be said that something is in “your custody”? What are the three steps for chain of custody procedures when dealing with data? When should you prepare for an incident? What are the 5 steps for quick incident handling? When is a good time to test an incident plan?...
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following...
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following is a correct statement regarding digital forensics? It is the study of computer technology. It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law. It encompasses network and code analysis, and may be referred to as electronic data discovery. Digital forensic responsibilities should be assigned to a network administrator before an...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
Consumerization of Technology at IFG3 “There’s good news and bad news,” Josh Novak reported to the...
Consumerization of Technology at IFG3 “There’s good news and bad news,” Josh Novak reported to the assembled IT management team at their monthly status meeting. “The good news is that our social media traffic is up 3000% in the past two years. Our new interactive website, Facebook presence, and our U-Tube and couponing promotions have been highly successful in driving awareness of our ‘Nature’s Glow’ brand and are very popular with our target demographic—the under-30s. Unfortunately, the bad news is...
Mattel Responds to Ethical Challenges Business Ethics This case was written by Debbie Thorne, John Fraedrich,...
Mattel Responds to Ethical Challenges Business Ethics This case was written by Debbie Thorne, John Fraedrich, O. C. Ferrell, and Jennifer Jackson, with the editorial assistance of Jennifer Sawayda. This case was developed for classroom discussion rather than to illustrate either effective or ineffective handling of an administrative, ethical, or legal discussion by management. All sources used for this case were obtained through publicly available material. Mattel, Inc. is a world leader in the design, manufacture, and marketing of family...
Discuss ethical issues that can be identified in this case and the mode of managing ethics...
Discuss ethical issues that can be identified in this case and the mode of managing ethics Enron finds itself in this case. How would you describe the ethical culture and levels of trust at Enron? Provide reasons for your assessment. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among...
What role could the governance of ethics have played if it had been in existence in...
What role could the governance of ethics have played if it had been in existence in the organization? Assess the leadership of Enron from an ethical perspective. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among the top Fortune 500 companies, collapsed in 2001 under a mountain of debt...
Discuss how the respective organizations’ relations with stakeholders could have potentially been affected by the events...
Discuss how the respective organizations’ relations with stakeholders could have potentially been affected by the events that took place at Enron and how the situation could have been dealt with differently to prevent further damage? THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among the top Fortune 500 companies,...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT