Reference no: EM132430865
Question 1: (T or F) Since we don't have a set cybersecurity theory, we can't design secure systems with a given level of Security
Question 2: (Short Answer) What are some of the Best Practices for security?
Question 3: (Short Answer) What is an adversary?
Question 4: (Short Answer) What are the benefits of signing up for the US-CERT?
Question 5: (T/F) Even if a company is not under a high level of threat to its information system information systems they should patch up their system, virus protections may not be in place; it needs intrusion detection/prevention systems
Question 6: (Fill in the blank) Vulnerabilities are ....
Question 7: (T / F) Risk can be eliminated, or mitigated, or accepted, or averted.
Question 8: (Short Response) What is the Security Life Cycle?
Question 9: (Short Response) What does the Bell LaPadula Security model ensure?
Question 10: (Fill in the blank) In Operating Systems: Biba protects kernel-level processes from ________