




免费预览已结束,剩余1页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
学号除以5余数为0做1-4,余数为1做5-8,余数为2做9-12,余数为3做13-16,余数为4做17-20 将英文翻译成中文,然后上交,上交文件名为两位学号+姓名。1.What is the difference between a threat agent and a threat?A threat agent is the specific instance or component of a threat, whereas a threat is a category of objects, persons, or other entities that represents a potential danger to an asset. Threats are always present. Some threats manifest themselves in accidental occurrences and others are purposeful. Fire is a threat; however a fire that has begun in a building is an attack. If an arsonist set the fire then the arsonist is the threat-agent. If an accidental electrical short started the fire, the short is the threat-agent.2.What is the difference between vulnerability and exposure?Exposure is an actual instance when the information system is compromised and is open to potential danger. Vulnerability is a weakness in the system or protection mechanism that allows information to be compromised or an attack to cause damage. Examples of vulnerabilities are flaws in software that can allow hackers to enter and manipulate system resources such as a flaw in MS Internet Explorer. Vulnerability may lead to exposure. Exposure is the actual instance that a systems security is open to potential damage. 3.How has the definition of “hack” evolved over the last 30 years?In the early days of computing, computer enthusiasts could tear apart the computer instruction code, or the computer itself, to manipulate its output. This was often called hacking the computer or hacking the program, as in hacking it to bits. Hackers had the ability to make computing technology work as desired in the face of adversity. Today, the usage of the word hack is perceived as part of a culture of illegal activities using computers and telecommunications systems. 4.What type of security was dominant in the early years of computing?In the early years of computing when security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or connections between the computers. This led to circumstances where most information being stored on computers to be vulnerable since information security was often left out of the design phase of most systems.5.What are the three components of the CIA triangle? What are they used for?The three components of the C.I.A. are: confidentiality (assurance that the information is shared only among authorized persons or organizations); integrity (assurance that the information is complete and uncorrupted); and availability (assurance that the information systems and the necessary data are available for use when they are needed). These three components are frequently used to conveniently articulate the objectives of a security program that must be used in harmony to assure an information system is secure and useable.6.If the C.I.A. triangle is incomplete, why is it so commonly used in security?The CIA triangle is commonly used in security because it addresses the fundamental concerns of information: confidentiality, integrity, and availability. It is still used when not complete because it addresses all of the major concerns with the vulnerability of information systems.7.Describe the critical characteristics of information. How are they used in the study of computer security?The critical characteristics of information define the value of information. Changing any one of its characteristics changes the value of the information itself. There are seven characteristics of information: Authenticity is the quality or state of being genuine or original, rather than a reproduction or fabrication. Confidentiality is the quality or state of preventing disclosure or exposure to unauthorized individuals or systems. Integrity is the quality or state of being whole, complete, and uncorrupted. Utility is the quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. Possession is the quality or state of having ownership or control of some object or item. Confidentiality is ensuring that only those with rights and privileges to access a particular set of information are able to do so, and those who are not are prevented from doing so. Integrity is the quality or state of being whole, complete, and uncorrupted Availability is enables users who need to access information to do so without interference or obstruction, and to receive it in the required format.8.Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with this study?The five components are software, hardware, data, people, and procedures. People would be impacted most by the study of computer security. When hardening security, people dealing with the system could be a weakest link because they can often become a threat. Policy, education and training, awareness and technology should be understood properly in order to keep those people from obtaining unauthorized access.Procedures, written instructions for accomplishing a specific task, could be another component, which will be impacted. The information system will be effectively secured by educating employees about safeguarding the procedures. Also, provision of proper education on the protection of those procedures can avoid unauthorized access gained using social engineering.The hardware and software components are the components that are historically associated with the study of computer security. 9.In the history of the study of computer security, what system is the father of almost all multi-user systems?MULTICS10.What paper is the foundation of all subsequent studies of computer security?Rand Report R-609, sponsored by the Department of Defense.11.How is the top down approach to information security superior to the bottom up approach?The top down approach is superior because it typically has the backing of the entire organization behind it. Management is the key to this approach. Most successful projects must have a champion. See page 20 of the text This champion is usually a top executive that can guarantee financial as well as, administrative backing for the life of the project. Another success factor to the top down approach is that most of the time a methodology such as the secSDLC is put in place in order to ensure that the proper steps are taken to keep the project efficient, organized and on schedule. The bottom up approach is sometimes used. Usually in the bottom up approach a systems administrator is involved in trying to secure his/her own systems. This can be good because the systems administrator has a very comprehensive understanding of their system, but without a champion or top management behind the project they usually do not succeed.12.Why is a methodology important in the implementations of information security? How does a methodology improve the process?A methodology is a formal technique that has a structured sequence of procedures that is used to solve a problem. Methodology is important in the implementation of information security because it ensures that development is structured in an orderly, comprehensive fashion. The methodology unifies the process of identifying specific threats and the creation of specific controls to counter those threats into a coherent program. Thus, a methodology is important in the implementation of information security for two main reasons. First, it entails all the rigorous steps for the organizations employees to follow, therefore avoiding any unnecessary mistakes that may compromise the end goal (i.e., to have a comprehensive security posture). An example of this is that a methodology guides an organization to solve the root cause of information security problem, not just its symptoms. Second, methodology increases the probability of success. Once a methodology is adopted, the personnel selected will be responsible for establishing key milestones and make accountable to achieve the project goals.The methodology can greatly improve the process. For example, following the six steps of the SDLC (Systems Development Life Cycle) (investigation, analysis, logical design, physical design, implementation, and maintenance and change) allows developments to proceed in an orderly, comprehensive fashion. Individuals or groups assigned to do the analysis step do not have to initiate their work until the investigation step is completely finished. Moreover, each step of the methodology may determine whether the project should be continued, outsourced, or postponed. For example, the physical design step may need to be postponed or outsourced if the organization does not possess the technology needed.13.Who is involved in the security development life cycle? Who leads the process?Initiation and control of the SecSDLC is the responsibility of upper management. Responsible managers, contractors and employees are then utilized to execute the SecSDLC. The process is usually led by a senior executive, sometimes called the champion, that promotes the project and secures financial, administrative, and company wide backing of the project, then a project manager is assigned the task of managing the project.14.How does the practice of information security qualify as both an art and a science? How does security as a social science influence its practice?The practice of information security is a never-ending process. A good effective information security practice must be considered as a tripod that relates to three important aspects (science, art, and social science): First, information security is science because it requires various kinds of tools and technologies used for technical configurations. It can also include sound information security plans and policies that may dictate the needs of particular technologies. Second, information security is also an art because there are no clear-cut rules on how to install various security mechanisms. Different factors such as budgets, time, threats, risks, vulnerabilities, and asset values can significantly affect the numbers and types of passive and active controls an organization needs. The overall goal is for the organization to have a good sound information security posture that can reduce the risks of being attacked as much as possible. Third, and most importantly, information security must be looked at as a social science mainly because social science deals with people, and information security is a people issue, not a technology issue. Through the eye of a social scientist, an organization can greatly benefit from the Security Education, Training, and Awareness program (SETA), which can make employees (1) know how to perform their job more securely, (2) be fully aware of the security issues within the organization, and (3) be accountable for their actions. Therefore, information security must be viewed as having all three natures, with the most emphasis on the social science perspective. After all, people are the ones who make other four components of information assets (data, procedures, software, and hardware) possible.15.Who is ultimately responsible for the security of information in the organization?The Chief Information Security Office is primarily responsible for the security of information. His recommendations are important to the Chief Information Officer who advises the Chief Executive Officer; therefore, the CEO is ultimately responsible for the security of information in the organization.16.What is the relationship between the MULTICS project and early development of computer security?MULTICS, Multiplexed Information and Computing Service, was the first and only operating system created with security as its primary goal. It was a mainframe, time-sharing operating system developed through a partnership with GE, Bell Labs and MIT. This mainframe operating system was a major focus for most research on computer security in the early stages.17.How has computer security evolved into modern information security?Before the creation and use of networking technologies computer security consisted of securing the physical location of the system by the use of badges, keys and facial recognition. As networking came into use and with the creation of ARPANET it was no longer safe to just physically secure a system. At this point it was not adequate to just physically secure a system. In order to insure total security the information itself and the hardware used to transmit and store the information needed to be addressed. Information security arouse from this need and adopted computer security as just one of its components.18. What was important about Rand Report R-60
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 惠州消防安全知识培训课件
- 情感剧创作思路探究
- 2026届江西省玉山县二中高一化学第一学期期中检测试题含解析
- 2026届江苏南京玄武区化学高一上期中调研模拟试题含解析
- 同学聚会活动背景图片策划方案
- 中继间技术措施的方案
- 清明节策划活动的方案
- 网球教学考试题及答案
- 现代日语面试题及答案
- 日语阅读试题及答案
- 2022版新《物理》义务教育课程标准教师培训测试题附答案
- 辽宁省丹东市2023-2024学年八年级下学期期末数学试卷(含答案)
- TSG+11-2020锅炉安全技术规程
- 从高考改卷谈对物理教学的几点启示
- DB32-T 4757-2024 连栋塑料薄膜温室建造技术规范
- 个人征信查询授权书范本
- 2024新版实习律师协议
- 县乡教师选调进城考试《教育心理学》题库含完整答案【全优】
- 2024年莆田辖区新华书店招聘笔试参考题库附带答案详解
- 初中化学酸碱中和反应省公开课一等奖全国示范课微课金奖课件
- JTG-T 3331-04-2023 多年冻土地区公路设计与施工技术规范
评论
0/150
提交评论