Reference no: EM133233981
Assignment - Radical Ideologies & Maoism in the Twentieth Century Essay
Description - Your exam consists of the questions listed below. You must answer 5 of the following questions. Your answers must be typed in double space format using 10-12 pitch font size. Begin the answer for each question on a new page. Ensure your name is on all pages. You must submit your answers on the fourth week of class; points will be deducted for late submissions. This exam is an individual effort; it is not to be completed as a group exercise.
1. Define the components of the C-I-A triad. Discuss the significance of the key concepts of privacy, identification, authentication, authorization, and accountability in relation to the triad.
2. Discuss the challenges and impacts of IoT on business.
3. Discuss the anatomy of an attack or breach. What motivates the hacker? What are the phases of the attack? What is the impact to the organization?
4. Discuss various countermeasures an organization may implement to protect their assets.
5. Discuss the components of Risk Management. Explain the activities involved in each activity.
6. Discuss the various recovery strategies. Include an explanation of the BIA, IRP, DRP, and BCP and how each is used for recovery.
7. Discuss the difference between a threat and an attack. Describe how a vulnerability may be used in an attack. Provide an example of an approach to managing the risk.
8. Discuss the difference between authentication and authorization. Include examples of authentication types and access controls in your discussion.