Free Essay

Information Security Chapter Two

In:

Submitted By victorp263
Words 907
Pages 4
Chapter 2 Review Questions
1. Why is information security a management problem? What can management do that technology cannot? Decision-makers in organizations must set policy and operate their organization in a manner that complies with the complex, shifting political legislation on the use of technology. Management is responsible for informed policy choices and the enforcement of decisions that affect applications and the IT infrastructures that support them.
2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? Without data there will be no record of anything that they have done.
3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both General management and IT management.
4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? More risk, now that attackers have the potential to access the networks from anywhere.
5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. When information is held hostage until demands are met.
7. What measures can individuals take to protect against shoulder surfing? Avoid, if possible, accessing sensitive information whenever others are present. Be aware of your surroundings.
8. How has the perception of the hacker changed over recent years? What is the profile of a hacker today? The perception of a hacker has changed and grown to include male/females from the ages of 12-60.
9. What is the difference between a skilled hacker and an unskilled hacker (other than skill levels)? How does the protection against each differ? A skilled hacker will create their own tools to get their jobs done, while an unskilled hacker will use tools created by others.
10. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? Common types of malware are viruses, worms, Trojan horses, logic bombs, and back doors. Computer viruses are segments of code that induce other programs to perform actions. Worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. Once a trusting user executes a Trojan horse program it will unleash viruses or worms to the local workstation and the network as a whole.
11. Why does polymorphism cause greater concern than traditional malware? How does it affect detection? Polymorphism makes code more difficult to detect. Since the code keeps changing it is harder to detect by anti-viruses.
12. What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it? Unauthorized duplication of software based intellectual property is the most common form of this. There are digital watermarks that can be imbedded into the property to prevent this. The software and information industry association (SIIA) and the business software alliance (BSA).
13. What are the various types of force majeure? Which type might be of greatest concern to an organization in Las Vegas? Oklahoma City? Miami? Los Angeles? Fire, flood, earthquake, tornado, etc are all examples of this. Los Angeles would be most concerned with earthquakes.
14. How does technological obsolescence constitute a threat to information security? How can an organization protect against it? It can be prevented through proper planning and replacing outdated technologies.
15. Does the intellectual property owned by an organization usually have value? If so, how can attackers threaten that value? Yes, if the hacker would steal it and sell copies of it to your competitors it can be bad for your business.
16. What are the types of password attacks? What can a systems administrator do to protect against them? Password crack, brute force, and dictionary are three types of password attacks. To protect against these types of attacks the admin should set policies which require the use of special characters, disallow dictionary works, or set a limit on the number of attempts allowed.
17. Whatisthedifferencebetweenadenial-of-serviceattackandadistributeddenial-of-service attack? Which is more dangerous? Why? A dos attach is when the attacker sends a large number of packets from a single source to overload a system, while a ddos is doing the same thing, but from many computers from many different areas. A ddos attack is much more dangerous because it is harder to track, and there is a larger strain on the network.
18. For a sniffer attack to succeed, what must the attacker do? How can an attacker gain access to a network to use the sniffer system? The attacker must be connected to the network in order to use a sniffer. The hacker can use social engineering to get the credentials of the network.
19. What methods does a social engineering hacker use to gain information about a user’s login id and password? How would this method differ if it were targeted towards an administrator’s assistant versus a data-entry clerk? Social engineers may roleplay as someone of importance who is in need of the credentials or roleplay as someone who may have forgot their credentials to get it from an administrator.
20. What is a buffer overflow, and how is it used against a Web server? A buffer overflow is when more data is sent to a buffer than the buffer can handle. It can be caused by a mismatch in processing rates between machines involved in the communication process.

Similar Documents

Premium Essay

Assign

...Color profile: Disabled Composite Default screen BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Wm. Arthur Conklin / 619-8 / Chapter 2 2 General Security Concepts “The only real security that a man can have in this world is a reserve of knowledge, experience and ability.” —HENRY FORD In this chapter, you will learn how to ■ Define basic terms associated with computer and information security ■ Identify the basic approaches to computer and information security ■ Distinguish among various methods to implement access controls ■ Describe methods used to verify the identity and authenticity of an individual ■ Describe methods used to conduct social engineering ■ Recognize some of the basic models used to implement security in operating systems 20 P:\010Comp\BaseTech\619-8\ch02.vp Wednesday, November 09, 2011 2:01:20 PM I n Chapter 1, you learned about some of the various threats that we, as security professionals, face on a daily basis. In this chapter, you start exploring the field of computer security. Color profile: Disabled Composite Default screen BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Wm. Arthur Conklin / 619-8 / Chapter 2 ■ Basic Security Terminology The term hacking has been used frequently in the media. A hacker was once considered an individual who understood the technical aspects of computer operating systems...

Words: 16889 - Pages: 68

Premium Essay

Course Outline

...VLT2 - Security Policies and Standards - Best Practices Course of Study This course supports the assessments for VLT2. The course covers 3 competencies and represents 3 competency units. Introduction Overview The skills and knowledge measured by performance assessment VLT2 are derived from a survey of information security professionals from around the world and are also based on the many different information security and assurance frameworks (ISO 27001/2, COBIT, ITL, etc.). The results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content. The Security Policy and Standards subdomain focuses on creating organizational security activities and policies; assessing information security risk; and implementing and auditing information security management programs, information assurance certification programs, and security ethics. Watch the following video for an introduction to this course: Competencies This course provides guidance to help you demonstrate the following 3 competencies: Competency 427.3.2: Controls and Countermeasures The graduate evaluates security threats and identifies and applies security controls based on analyses and industry standards and best practices. Competency 427.3.3: Security Audits The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices. Competency 427...

Words: 4354 - Pages: 18

Premium Essay

Bsop 434 Week 5 Assignment

... Contact us at: SUPPORT@ACTIVITYMODE.COM BSOP 434 WEEK 5 ASSIGNMENT Chapter 3: Question 3: Name the six general types of information management systems, and give one logistics application for each one that you’ve named. Chapter 13: Question 2: What is activity-based costing (ABC)? What are the five steps of the ABC process? Question 17: Describe the two issues that managers face with respect to computer and data security. Chapter 14: Question 3: What are the differences between a centralized and a decentralized logistics department? Question 20: Name the seven types of comprehensive logistics systems audits that should be performed. Which do you view as the most important? The least important? Why? Activity mode aims to provide quality study notes and tutorials to the students of BSOP 434 Week 5 Assignment in order to ace their studies. BSOP 434 WEEK 5 ASSIGNMENT To purchase this visit here: http://www.activitymode.com/product/bsop-434-week-5-assignment/ Contact us at: SUPPORT@ACTIVITYMODE.COM BSOP 434 WEEK 5 ASSIGNMENT Chapter 3: Question 3: Name the six general types of information management systems, and give one logistics application for each one that you’ve named. Chapter 13: Question 2: What is activity-based costing (ABC)? What are the five steps of the ABC process? Question 17: Describe the two issues that managers face with respect to computer and data security. Chapter 14: Question 3: What are the differences between a centralized and a decentralized...

Words: 791 - Pages: 4

Premium Essay

Doctor

...are considering investing $1,000 in a T-bill that pays 0.05 and a risky portfolio, P, constructed with 2 risky securities, X and Y. The weights of X and Y in P are 0.60 and 0.40, respectively. X has an expected rate of return of 0.14 and variance of 0.01, and Y has an expected rate of return of 0.10 and a variance of 0.0081. If you want to form a portfolio with an expected rate of return of 0.11, what percentages of your money must you invest in the T-bill and P, respectively? A. 0.25; 0.75 B. 0.19; 0.81 C. 0.65; 0.35 D. 0.50; 0.50 E. cannot be determined 2. You are considering investing $1,000 in a T-bill that pays 0.05 and a risky portfolio, P, constructed with 2 risky securities, X and Y. The weights of X and Y in P are 0.60 and 0.40, respectively. X has an expected rate of return of 0.14 and variance of 0.01, and Y has an expected rate of return of 0.10 and a variance of 0.0081. If you want to form a portfolio with an expected rate of return of 0.10, what percentages of your money must you invest in the T-bill, X, and Y, respectively if you keep X and Y in the same proportions to each other as in portfolio P? A. 0.25; 0.45; 0.30 B. 0.19; 0.49; 0.32 C. 0.32; 0.41; 0.27 D. 0.50; 0.30; 0.20 E. cannot be determined 3. You are considering investing $1,000 in a T-bill that pays 0.05 and a risky portfolio, P, constructed with 2 risky securities, X and Y. The weights of X and Y in P are 0.60 and 0.40, respectively. X has an expected rate of return of 0.14...

Words: 11481 - Pages: 46

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Premium Essay

Bsop 434 Week 5 Assignment

...SUPPORT@WISEAMERICAN.US BSOP 434 WEEK 5 ASSIGNMENT Chapter 3: Question 3: Name the six general types of information management systems, and give one logistics application for each one that you’ve named. Chapter 13: Question 2: What is activity-based costing (ABC)? What are the five steps of the ABC process? Question 17: Describe the two issues that managers face with respect to computer and data security. Chapter 14: Question 3: What are the differences between a centralized and a decentralized logistics department? Question 20: Name the seven types of comprehensive logistics systems audits that should be performed. Which do you view as the most important? The least important? Why? BSOP 434 WEEK 5 ASSIGNMENT Chapter 3: Question 3: Name the six general types of information management systems, and give one logistics application for each one that you’ve named. Chapter 13: Question 2: What is activity-based costing (ABC)? What are the five steps of the ABC process? Question 17: Describe the two issues that managers face with respect to computer and data security. Chapter 14: Question 3: What are the differences between a centralized and a decentralized logistics department? Question 20: Name the seven types of comprehensive logistics systems audits that should be performed. Which do you view as the most important? The least important? Why? BSOP 434 WEEK 5 ASSIGNMENT Chapter 3: Question 3: Name the six general types of information management systems, and give one logistics...

Words: 456 - Pages: 2

Free Essay

Student

...Application Services and Security Course Revision Table Footer Date: 09/30/07 10/10/07 Section: All All Reason for Change: New Curriculum QA Edits Implementation Date: December 2007 December 2007 © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys [Exam I —Unit 6] DATE: ________________________________ STUDENT NAME: ________________________________ COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access...

Words: 3277 - Pages: 14

Premium Essay

Information Security Policy for E-Government in Saudi Arabia: Effectiveness, Vulnerabilities

...Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats [Name of the Writer] [Name of the Institute] Executive Summary Introduction: In many countries, the implementation of the E-Government has proved to be useful in providing efficient services to the consumers. This increases the speed of the work and does not cause any unnecessary delays. All these aspects matters for the efficient service of the Government work. In the end, it proves to be beneficial for both Government and the citizens living in Saudi Arabia. Therefore, in this study, all the issues related to the Information Security Policy will be discussed in detail. The research study is worth for a number of reasons. Firstly, it will help in assessing the degree of effectiveness of the present security policy, security holes in the policy, and threats not addressed by the policy. It, in turn, would help in coming up with measures of ensuring that the policy is security-oriented, which increases citizens’ confidence in using e-government services. Literature Review: The primary purpose of producing literature review is to support the findings of this study via the theoretical justifications obtained from literature. The review revealed that in Saudi Arabia, there is the absence of agencies to monitor the accountability of e-government services. Most of the workers of offices in Saudi Arabia lack professionalism, and this is a great weakness in the implementation...

Words: 10327 - Pages: 42

Premium Essay

Bus 405 Principles of Investment Complete Class

...us/product/bus-405-principles-investment-complete-class/ Contact us at: SUPPORT@WISEAMERICAN.US BUS 405 PRINCIPLES OF INVESTMENT COMPLETE CLASS Week 1 Assignment Annualized Returns Chapter 3 problem 18 Complete problem 18 in Chapter 3 (shown below) and submit to the instructor. Show your work to find the annualized return for each of the listed share prices. Write a 100 word analysis of the process to calculate these annualized returns. Suppose you have $28,000 to invest. You’re considering Miller-Moore Equine Enterprises (MMEE), which is currently selling for $40 per share. You also notice that a call option with a $40 strike price and six months to maturity is available. The premium is $4.00. MMEE pays no dividends. What is your annualized return from these two investments if, in six months, MMEE is selling for $48 per share? What about $36 per share? Week 1 DQ1 Blume’s Formula, Allocation, and Selection From Chapter 1, answer Concept Question 5: What is Blume’s formula? When would you want to use it in practice? Also, from Chapter 2, answer Concept Question 4: What is the difference between asset allocation and security selection? Remember to complete all parts of the questions and support your answers with examples from the text and other resources. Week 1 DQ2 Money Market Funds From Chapter 4, complete Problem 4: The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. During the year, the assets held by this fund appreciated by 2.5 percent. If you...

Words: 1933 - Pages: 8

Premium Essay

Bus 405(Principles of Investment) Complete Class

...com/BUS-405-Principles-of-Investment-Complete-Course-ASHFORD-1398.htm?categoryId=-1 If You Face Any Problem E- Mail Us At Contact.Hwnerd@Gmail.Com Week 1 Assignment Annualized Returns Chapter 3 problem 18 Complete problem 18 in Chapter 3 (shown below) and submit to the instructor. Show your work to find the annualized return for each of the listed share prices. Write a 100 word analysis of the process to calculate these annualized returns. Suppose you have $28,000 to invest. You’re considering Miller-Moore Equine Enterprises (MMEE), which is currently selling for $40 per share. You also notice that a call option with a $40 strike price and six months to maturity is available. The premium is $4.00. MMEE pays no dividends. What is your annualized return from these two investments if, in six months, MMEE is selling for $48 per share? What about $36 per share? Week 1 DQ1 Blume’s Formula, Allocation, and Selection From Chapter 1, answer Concept Question 5: What is Blume’s formula? When would you want to use it in practice? Also, from Chapter 2, answer Concept Question 4: What is the difference between asset allocation and security selection? Remember to complete all parts of the questions and support your answers with examples from the text and other resources. Week 1 DQ2 Money Market Funds From Chapter 4, complete Problem 4: The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. During the year, the assets held by this fund appreciated by 2.5 percent...

Words: 1945 - Pages: 8

Premium Essay

Bus 405(Principles of Investment) Complete Class

...com/BUS-405-Principles-of-Investment-Complete-Course-ASHFORD-1398.htm?categoryId=-1 If You Face Any Problem E- Mail Us At Contact.Hwnerd@Gmail.Com Week 1 Assignment Annualized Returns Chapter 3 problem 18 Complete problem 18 in Chapter 3 (shown below) and submit to the instructor. Show your work to find the annualized return for each of the listed share prices. Write a 100 word analysis of the process to calculate these annualized returns. Suppose you have $28,000 to invest. You’re considering Miller-Moore Equine Enterprises (MMEE), which is currently selling for $40 per share. You also notice that a call option with a $40 strike price and six months to maturity is available. The premium is $4.00. MMEE pays no dividends. What is your annualized return from these two investments if, in six months, MMEE is selling for $48 per share? What about $36 per share? Week 1 DQ1 Blume’s Formula, Allocation, and Selection From Chapter 1, answer Concept Question 5: What is Blume’s formula? When would you want to use it in practice? Also, from Chapter 2, answer Concept Question 4: What is the difference between asset allocation and security selection? Remember to complete all parts of the questions and support your answers with examples from the text and other resources. Week 1 DQ2 Money Market Funds From Chapter 4, complete Problem 4: The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. During the year, the assets held by this fund appreciated by 2.5 percent...

Words: 1945 - Pages: 8

Premium Essay

Ashford Bus 405(Principles of Investment) Entire Class

...com/ASHFORD-BUS-405-Principles-of-Investment-Complete-Class-A-WORK-765747.htm If You Face Any Problem E- Mail Us At JohnMate1122@gmail.com Week 1 Assignment Annualized Returns Chapter 3 problem 18 Complete problem 18 in Chapter 3 (shown below) and submit to the instructor. Show your work to find the annualized return for each of the listed share prices. Write a 100 word analysis of the process to calculate these annualized returns. Suppose you have $28,000 to invest. You’re considering Miller-Moore Equine Enterprises (MMEE), which is currently selling for $40 per share. You also notice that a call option with a $40 strike price and six months to maturity is available. The premium is $4.00. MMEE pays no dividends. What is your annualized return from these two investments if, in six months, MMEE is selling for $48 per share? What about $36 per share? Week 1 DQ1 Blume’s Formula, Allocation, and Selection From Chapter 1, answer Concept Question 5: What is Blume’s formula? When would you want to use it in practice? Also, from Chapter 2, answer Concept Question 4: What is the difference between asset allocation and security selection? Remember to complete all parts of the questions and support your answers with examples from the text and other resources. Week 1 DQ2 Money Market Funds From Chapter 4, complete Problem 4: The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. During the year, the assets held by this fund appreciated by 2.5 percent...

Words: 1945 - Pages: 8

Premium Essay

I Do Not Know

...A Framework for IT Governance in Small Businesses by Herman Koornhof A FRAMEWORK FOR IT G O V E R N A N C E by IN SMALL BUSINESSES Herman Koornhof TREATISE Submitted for the partial fulfilment of the requirements for the degree MAGISTER TECHNOLOGIAE in Business Information Systems in the FACULTY ENGINEERING, BUILT ENVIRONMENT OF THE AND INFORMATION TECHNOLOGY of the N E L S O N M A N D E L A M E T R O P O L I T A N U N I V E R SI T Y Supervisor: Prof. Rossouw von Solms January 2009 ii Declaration I, Herman Koornhof, hereby declare that: • • • The work in this treatise is my own work. All sources used or referred to have been documented and recognised. This treatise has not previously been submitted in full of partial fulfilment of the requirements for an equivalent or qualification at any other recognised educational institution. higher Herman Koornhof iii Acknowledgements I would like to express my gratitude to the following people: • My love, Jenny, for your love and understanding during the past year. Without your encouragement and inspiration this work would not have been possible. • • My family and friends for your interest and support. My supervisor, Prof. Rossouw von Solms, for your guidance and advice, and your detailed and constructive comments. • To Him who is able to do immeasurably more than all we ask or imagine, according to his power that is at work within us. iv Table...

Words: 36563 - Pages: 147

Premium Essay

Bus 405(Principles of Investment) Complete Class

...com/BUS-405-Principles-of-Investment-Complete-Course-ASHFORD-1398.htm?categoryId=-1 If You Face Any Problem E- Mail Us At Contact.Hwnerd@Gmail.Com Week 1 Assignment Annualized Returns Chapter 3 problem 18 Complete problem 18 in Chapter 3 (shown below) and submit to the instructor. Show your work to find the annualized return for each of the listed share prices. Write a 100 word analysis of the process to calculate these annualized returns. Suppose you have $28,000 to invest. You’re considering Miller-Moore Equine Enterprises (MMEE), which is currently selling for $40 per share. You also notice that a call option with a $40 strike price and six months to maturity is available. The premium is $4.00. MMEE pays no dividends. What is your annualized return from these two investments if, in six months, MMEE is selling for $48 per share? What about $36 per share? Week 1 DQ1 Blume’s Formula, Allocation, and Selection From Chapter 1, answer Concept Question 5: What is Blume’s formula? When would you want to use it in practice? Also, from Chapter 2, answer Concept Question 4: What is the difference between asset allocation and security selection? Remember to complete all parts of the questions and support your answers with examples from the text and other resources. Week 1 DQ2 Money Market Funds From Chapter 4, complete Problem 4: The Aqua Liquid Assets Money Market Mutual Fund has a NAV of $1 per share. During the year, the assets held by this fund appreciated by 2.5 percent...

Words: 1945 - Pages: 8

Premium Essay

Form 10-K

...OMB APPROVAL UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 OMB Number: 3235-0063 Expires: April 30, 2015 Estimated average burden hours per response ... . 1,998.78 FORM 10-K ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 GENERAL INSTRUCTIONS A. Rule as to Use of Form 10-K. (1) This Form shall be used for annual reports pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)) (the “Act”) for which no other form is prescribed. This Form also shall be used for transition reports filed pursuant to Section 13 or 15(d) of the Act. (2) Annual reports on this Form shall be filed within the following period: (a) 60 days after the end of the fiscal year covered by the report (75 days for fiscal years ending before December 15, 2006) for large accelerated filers (as defined in 17 CFR 240.12b-2): (b) 75 days after the end of the fiscal year covered by the report for accelerated filers (as defined in 17 CFR 240.12b-2); and (c) 90 days after the end of the fiscal year covered by the report for all other registrants. (3) Transition reports on this Form shall be filed in accordance with the requirements set forth in Rule 13a-10 (17 CFR 240.13a-10) or Rule 15d-10 (17 CFR 240.15d-10) applicable when the registrant changes its fiscal year end. (4) Notwithstanding paragraphs (2) and (3) of this General Instruction A., all schedules required by Article 12 of Regulation S-X...

Words: 6161 - Pages: 25