StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

INFA questions - Assignment Example

Cite this document
Summary
As much as lower EALs cost less, they however do not provide increased assurance. Rather higher level EALs provide high assurance although they come at increased cost due to the more detailed documentation required, analysis and testing. Therefore EAL4 though cheaper does…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
INFA questions
Read Text Preview

Extract of sample "INFA questions"

Computer Security Computer Security Data confidentiality Short timeliness- one time passwords Long timeliness – user details like email, home address, telephone 2. EAL 4 versus EAL 7FALSE. As much as lower EALs cost less, they however do not provide increased assurance. Rather higher level EALs provide high assurance although they come at increased cost due to the more detailed documentation required, analysis and testing. Therefore EAL4 though cheaper does not provide high assurance.3. It is TRUE that a business continuity plan explains how an organization will maintain operational capabilities during an incident, while an incident response describes how the organization will handle the security incident itself.4. Defense in DepthTRUE.

Defense in dense entails use of several layers of security. It does not dictate how many or which tool to use in improving the security of system. Rather, the choice on what number of layers and technologies to use depends upon the risk analysis done by the organization (Cisco).5. TRUE. Physical security and information security are often managed by different organizations. However, risk analysis for information security still needs to address physical security6. TRUE. In conducting a risk analysis, it is often not possible to directly estimate the probability of an event (attack).7. Not a security architecture framework     (a.) Sherwood Applied Business Security Architecture (SABSA)8.

     g. (a), (b), (c) and (d)9. TRUE. Security controls are the (main) mechanisms/means used to reduce risk consequence and risk likelihood.10. FALSE. Denial of service attacks primarily affect confidentiality whereas inference attacks primarily affect availability. Part 2: Short Answers (15 points each). Please answer briefly and completely, and cite all sources of information. Please restrict your answer for each question to one (1/2) page (double spaced). 1. Explain the difference between a vulnerability, threat, and control.

Define each and please provide an example of each. (1/2 page)Management control Concerned with the way authority is assigned and organized (Northcutt). Entails formulating security policies, guidelines and planning in order to reduce loss (Stallings & Brown). Basically involves setting what employees may do, must always do, or cannot do. Examples include changing of policies, installing motion detectors, security awareness training among others.Operational controlInvolves enforcing the implementation of security policies, standards and also maintaining consistency in operations together with executing corrective measures in case of deficiencies (Stallings & Brown).

The procedures are effected on both hardware and software. Examples include recovery actions like system reboot, data backup and access control to data (Slideshare).Technical ControlIt involves utilizing the security capabilities of the hardware and software. The security once set up is managed entirely by the computer system. Examples include setting up firewalls and access tokens, password encryptions.2. Most security models categorize controls into three types: management, operational, and technical.

Describe each of these categories, and provide two examples of controls that would fall within each category. (1/2 page)VulnerabilityA characteristic of a technology that someone can take advantage of to orchestrate a security incident (Stallings & Brown). Example is when a program unintentionally allows ordinary users to execute commands that can only be executed by privileged users.ThreatA potential for violation of a security policy that comes into play when there is an event or circumstance that could trigger breaching of security and therefore cause harm.

It can be explained as a possible danger that could result in someone taking advantage of a vulnerability to breach security. Example is when an individual gains access to data that they are not supposed to thus there comes in a threat where sensitive data is exposed to unauthorized persons. (Stallings & Brown)ControlA means of managing risk by laying down policies, procedures, guidelines, practices and organizational structures. These can be effected in administrative, management or technical manner.

Examples of control include installation of security cameras, motion sensors and guards in order to effect physical access to the system.BibliographyAnciaux, N., Bauganim, L. & Pucheral, P. Data Confidentiality. Retrieved from http://www- caravel.inria.fr/dataFiles/ABP06b.pdf Cisco. Understanding Operations Security. Retrieved from http://www.cisco.com/web/about/security/intelligence/opsecurity.htmlMicrosoft. Data Confidentiality. Retrieved from https://msdn.microsoft.com/en- us/library/ff650720.

aspxNorthcutt, S. Security Controls. Retrieved from http://www.sans.edu/research/security- laboratory/article/security-controls Slideshare. Operations Security. Retrieved from http://www.slideshare.net/7wounders/8- operations-securityStallings, W. & Brown, L. Computer Security Principles and Practice. Retrieved from http://www.ebookandpdf.com/security-info/40252-computer-security-principles-and- practice-2nd_2.htmlUniversity of Washington. Administrative Policies. Retrieved from http://www.

washington.edu/admin/rules/policies/APS/02.06.htmlU.S.NRC. Defense in Depth. Retrieved from http://www.nrc.gov/reading-rm/basic-ref/glossary/defense-in-depth.htmlWhatIs.com. Security Management. Retrieved from http://whatis.techtarget.com/glossary/Security-Management

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“INFA questions Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
INFA questions Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1679252-infa-questions
(INFA Questions Assignment Example | Topics and Well Written Essays - 500 Words)
INFA Questions Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1679252-infa-questions.
“INFA Questions Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1679252-infa-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF INFA questions

The Womens Question in Nineteenth Century India

The question of women and their participation within the question of modernity in colonies is one that leads to more questions than answers.... The question of women and their participation within the question of modernity in colonies is one that leads to more questions than answers.... The writings of many women writers of this era however, posed questions to these movements and made them aware of the need for a reassessment of the problems that pre-colonial traditions posed and the ways that were being employed for the purpose of engaging with them....
5 Pages (1250 words) Research Paper

English Composition

In thinking about the opposition, here are a few questions that the writer should ask: What will they say against my idea?... But when a writer wants to influence the readers and be able to change their view on something, the writer uses persuasion.... hellip; Unlike other types of essays, persuasive essay does not only depict the writer's personal opinions about a topic, but that of the authorities....
3 Pages (750 words) Essay

Domain Name System in Different Jurisdictions

A writer of the paper "Domain Name System in Different Jurisdictions" reports that the consciousness about the preservation of the intellectual property is emerging day by day.... The website domain names are also another form of online intellectual property.... hellip; The Internet is at the present common in every field of life as well as every kind of organization....
5 Pages (1250 words) Term Paper

M Sc Dissertation Proposal ( Dividend policy)

When a company makes profit then the question of using the profit profitably also arises.... Under such circumstances a company will have… The dividend policy which a company adopts is established on the above two options.... As soon as a decision is taken a stable dividend policy can be adopted by the company....
4 Pages (1000 words) Essay

Assessing Personality

This assessment approach entails responding to the already set questions, which normally aids in establishing an individual's tendencies within the four categories (Daisley, 2011).... Myers-BriggsThis assessment approach entails responding to the already set questions, which normally aids in establishing an individual's tendencies within the four categories (Daisley, 2011)....
2 Pages (500 words) Essay

Reaction to Crisis questions

During the course of our friendship, this individual's self-control was obviously maladjusted, leading to spontaneous… It became increasingly clear that this individual lacked obedience, emotional intelligence, and understanding of common and accepted social behaviors. During the course of this rather nightmarish scenario, I was able to create a positive situation from a very negative set Reaction to Crisis questions BY YOU YOUR SCHOOL INFO HERE HERE Reaction to Crisis questions I once befriended an individual that had problems with alcohol and was being subject to domestic violence classes that were mandated by state authorities....
2 Pages (500 words) Research Paper

Flipgrid in Turkish Language Classes

These grids contain text or video questions which are then responded to by students through video recordings (Flipgrid 2014 a).... The frequency of questions varies; Weekly questions are asked at the end of each week after 5 hours of weekly Turkish language instruction.... End of Unit questions are different from weekly questions as they are more summative in nature (Flipgrid 2014 b).... In a class of 10 students of Turkish B1, students were often asked varied questions about their learning experience and were asked together collaborative as couples or in two groups of 5 students each....
1 Pages (250 words) Article

Into the wild chapter question

Throughout the book the main character of Alex shows us how determined he is.... This can be reflected by the following quote.... “A little later Alex pulled out his crude map and pointed to a dashed red line that… It represented a route called the Stampede Trail.... Seldom traveled it isn't even marked on most road maps to Alaska....
1 Pages (250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us