Premium Essay

Informationsecurity Review Ch 1 and 2

In:

Submitted By Arod4409
Words 565
Pages 3
Ch. 1
1. A threat agent is the specific instance or a component of a threat, whereas a threat is a category of objects, persons, or other entities that presents a danger to an asset.

3. By ensuring the protection and continuity of utility services for an organization you prevent potential loss of productivity and revenue for that organization, as well as the prevention of possible breaches in security that may ensue if, for instance the power goes out and an alarm system or other remote monitoring system is disabled.
5. Confidentiality, Integrity, and Availability. These are used to determine the value and potential risk for information within an organization
7. Availability, accuracy, Authenticity, Confidentiality, Integrity, Utility and Possession. These are an expanded list of the characteristics of data that give it value to an organization and how it is used.
9. MULTICS
11. It is initiated by upper-level managers who issue policy, procedures, and expected outcomes, and determine accountability, it also has a higher probability of success.

13. Everyone from Upper management and IT, to the end user are involved whether through implementation and planning or compliance
15. Everyone, all employees at every level within an organization for the security of information within that organization
17. Initially the security of information was included in the category of computer security, which is the security of the physical computer, but as technology has advanced and the ability to access information remotely has become more prevalent and even commonplace it has required a more specialized field in order to secure the information itself.
19. The management of the organization itself. It is determined by the plan that the organization dictates

Ch. 2
2.Data is the most important because if lost can be irreplaceable, whereas other assets such as

Similar Documents

Free Essay

A Hands on Intro to Hacking

...reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066 I. Title. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a...

Words: 117203 - Pages: 469