We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Get Offer

Information and Computer Security

Paper type: Essay
Pages: 4 (838 words)
Categories: Computer,Computer security,Technology
Downloads: 3
Views: 529

What is the difference between a threat agent and a threat

A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.

What is the difference between vulnerability and exposure

The differences are: vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is open to damage.

Vulnerabilities can in turn be the cause of exposure.

How is infrastructure protection (assuring the security of utility services) related to information security

Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system.

What type of security was dominant in the early years of computing

The type of security was dominant in the early years of computing security was entirely physical security.

And MULTICS was first noteworthy operating system to integrate security in to its core system.

What are the three components of the C.I.A. triangle? What are they used for

The three components of the C.I.A triangle are:

  • Confidentiality: Information’s should only be accessible to its intended recipients.
  • Integrity: Information arrive the same as it was sent.
  • Availability: Information should be available to those authorized to use it.

If the C.I.A. triangle is incomplete, why is it so commonly used in security

The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. It contains three major characteristic confidentiality, integrity and availability which are important even today.

Describe the critical characteristics of information. How are they used in the study of computer security

The critical characteristics of information are:

  • Confidentiality-preventing disclosure to unauthorized individuals
  • Accuracy-free form errors;
  • Utility-has a value for some purpose;
  • Authenticity-genuine and Possession-ownership.

Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study

The six components are: Software, Hardware, Data, People, Procedures, and network. If there is a flaw or oversight in any of category it could lead to exposure and or vulnerabilities. The components most associated with the study of information security are: hardware and software when it views as science also people when it view as social science.

What system is the father of almost all modern multiuser systems

Mainframe computer systems

Which paper is the foundation of all subsequent studies of computer security

The foundation of all subsequent studies of computer security is the Rand Report R-609.

Why is the top-down approach to information security superior to the bottom-up approach

Top down has strong upper management support, dedicated funding, clear planning and the opportunity to influence organizations culture, whereas Bottom up lacks a number of critical features such as participant support and organizational staying power.

Why is a methodology important in the implementation of information security? How does a methodology improve the process

A formal methodology ensures a rigorous process and avoids missing steps.

Which members of an organization are involved in the security system development life cycle? Who leads the process

How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice

Information security can be described in Art because there are no hard and fast rules especially with users and policy. Also, it can be describe in Science because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time.

Who is ultimately responsible for the security of information in the organization

The Chief Information Security Officer (CISO)

What is the relationship between the MULTICS project and the early development of computer security

 It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security.

How has computer security evolved into modern information security

In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component.

What was important about Rand Report R-609

 RR609 was the first widely recognized published document to identify the role of management and policy issues in computer security.

Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these wishes are carried out

Control and use of data in the Data owners are responsible for how and when data will be used, Data users are working with the data in their daily jobs.

Who should lead a security team? Should the approach to security be more managerial or technical

A project manager with information security technical skills lead the team. The approach to security should be managerial, top down.

Cite this essay

Information and Computer Security. (2016, Oct 13). Retrieved from https://studymoose.com/information-and-computer-security-essay

How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Not Finding What You Need?

Search for essay samples now


Your Answer is very helpful for Us
Thank you a lot!