Distinguish between vulnerability-threat and control

Assignment Help Other Subject
Reference no: EM133119352

Chapter 1

Questions

1. Distinguish between vulnerability, threat, and control.

2. Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment.

3. List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.

4. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.

5. List at least three kinds of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which access is lost, and explain how this loss hurts the company.

Chapter 2

Questions

1. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

2. Defeating authentication follows the method-opportunity-motive paradigm described in Chapter One. Discuss how these three factors apply to an attack on authentication.

3. List three reasons people might be reluctant to use bio-metrics for authentication. Can you think of ways to counter those objections?

4. Humans are said to be the weakest link in any security system. Give an example for each of the following: (a) A situation in which human failure could lead to a compromise of encrypted data (b) A situation in which human failure could lead to a compromise of identification and authentication (c) A situation in which human failure could lead to a compromise of access control.

5. Why do cryptologists recommend changing the encryption key from time to time? Is it the same reason security experts recommend changing a password from time to time? How can one determine how frequently to change keys or passwords?

Reference no: EM133119352

Questions Cloud

What is the value today of a money machine : What is the value today of a money machine that will pay $1,437.00 per year for 18.00 years? Assume the first payment is made 5.00 years from today and the inte
Describe situation in which you have experienced harm : Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not?
Number of assets in the portfolio : Explain what happens to the risk of a portfolio as the number of assets in the portfolio is increased.
What is the rate of return on bee ltd shares : The share price for Bee Ltd at 1 July 2020 was $3.40 and at 30 June 2021 was $4.80. You have collected the following per share dividend data for 2020 and 2021:
Distinguish between vulnerability-threat and control : Distinguish between vulnerability, threat, and control. List three reasons people might be reluctant to use bio-metrics for authentication.
Present value of the cash flows : The appropriate discount rate for the following cash flows is 6.88 percent per year. CF1 = 2,380, CF2 = 0, CF3 = 3,820, CF4 = 2,070. What is the present value o
Prepare amortization table by using ms excel : On december 31, loren billingsley bought a yacht for $60,000, paying $15,000 down and agreeing to pay the balance in 10 equal annual installments include both p
Intelligence assets and information from foreign penetration : You may choose to act as the United States brainstorm ways to protect its intelligence assets and information from foreign penetration
Calculate the expected return of portfolio : You have invested $25,000 in Pfizer stock and $35,000 in Moderna stock. Pfizer stock has an expected return of 18% and volatility equal to 43%. Moderna stock ha

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd