What is the itsec

Assignment Help Computer Engineering
Reference no: EM1327028

1. What is the meaning of the CIA triad in Information Security?

2. What is the difference between Symmetric and Asymmetric Key Cryptography

3. What is SSL? What is SET? Which one is technically superior? Which one is the de-facto standard on commercial selling on the Internet?

4. Mention four advantages of Qualitative risk analysis

5. Mention four disadvantages of quantitative risk analysis

6. Define a safeguard....also known as ...................... or .........................

Define a threat

Define vulnerability

7. How do you calculate the total threat impact?

8. Give two examples of each of the following

Risk Avoidance

Risk Assurance

Risk Detection

Risk Recovery

9. What should be included in a risk analysis report? Be brief

10. Sketch the different tables for the following with one example row in each

Financial Loss table

Extent of legal implications table

Enterprise Embarrassment table

11. Sketch a Risk Analysis Matrix filled with a few suggested solutions

12. Which method(s) would you use for risk Analysis in the Military Base Network?
Select your top two favorites. Explain why?

1- Vulnerability Analysis
2- Hazard Impact Analysis
3- Threat Analysis
4- Questionnaires
5- Single-time loss algorithm

13. What is the formula used for ALE? (Annualized loss expectancy or Exposure)

14. A company's premises have one chance in a million of being affected by flooding. A flood would cost the company $10 million.

What would be your budget for mitigating the effects of the flood?

Would you start stocking up sand bags in preparation of the flood?

15. A company has a chance 1 in 3,000 of being within ten miles of an earthquake epicenter measuring 5.0 on the Richter scale. The Earthquake will cause $60 million of loss.

What would be the budget for reducing or preventing that damage?

16. A company has one large router that ties all their network segments. If the router dies it will take one day to repair. There is 70% chance that failure will occur once every 24 months. The outage will cause 1000 people to be out of work for a day. The company estimates the loss of productivity to be $68,000

How much should you spend for router redundancy?

17. What is BS7799? What is ISO 17799?

18. What is the difference between the Red Book and the Orange book in US government and defense security

19. What is ITSEC?

20. What is The Common Criteria?

21. T or F In risk analysis, the value of an asset can be estimated by asking for the book value from the accountant

22. T or F Security policies usually have to be written in a policy document

23. T or F Cost Benefit analysis is probably the most important step in any risk analysis process

24. Give an example of risk avoidance

25. Give an example of risk acceptance

Reference no: EM1327028

Questions Cloud

Knowledge of agency level enterprise operating systems : information of advanced Relational Database management Systems (RDMS) operating over a wide-area network. (note: Please explain RDMS operating over a WAN.)
What is value added in every sector also total output : What is value added in every sector also what is total output for the economy.
Conditions for allocating lease to another party : Several months into the term, a competitor unexpectedly releases a new game title featuring play that would make your game appear to be a poorly crafted imitation.
Finding standard deviation of waiting time : The frequency distribution below summarizes the results. Find the standard deviation.
What is the itsec : What is the meaning of CIA triad in Information Security.What is the difference between Symmetric and Asymmetric Key Cryptography
A number of lossless text compression algorithms exist : A number of lossless text compression algorithms exist, though , none of these methods is able to consistently reach its theoretical best-case compression ratio.
Theory galbraiths of consumer demand has an important : Theory Galbraiths of consumer demand has an important implication in terms of underallocation of resources to public goods.
Explaining the intent of law : How the US Constitution is applied is a good illustration of the struggle between discerning the letter of the law and the spirit of the law.
Leadership to centralize the power and decision making : Should the leadership try to centralize the power and decision making or decentralize the operation?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Standard apis supported by the jaxp

Explain two standard APIs supported by JAXP (Java API for XML processing) and provide a comparison between two mechanisms.

  Investigate typical applications of microprocessor based s

Investigate 3 typical applications of microprocessor based systems, which may conclue the following.

  Calculate and show the percentage of calories

Calculate and show the percentage of calories

  Find the percent of total weight that is quota

A teenager has 5 shirts, 7 jeans and some jackets, how many jackets must he have so that if he wore a different set of shirtsand jeans each day, he could continue for 140 days before he will have to repeat a set.

  Eurofins scientific is a bioanalytical service provider

Require a Project plan for the project (it doesn't need to be in ms project, word is fine). Including timelines, tasks and constraints. The project is a fictional business and idea that I needed to come up with and make a project plan, please allo..

  Calculating the overall class average

It is now the end of the semester and Alberta would like to have a program which inputs each student`s test scores and outputs average score for every students and the overall class average.

  What is the memory operations dominate execution time

What is  the memory operations dominate execution time

  Transfering the power over ethernet

A recent article in an industry magazine discussed the ability to transfer the Power over Ethernet (PoE) and an emerging technology which is able to transfer the Power over Fiber (PoF).

  Write c program ''myls'' that functions like unix command ''ls''

Write C program 'myls' that functions like unix command 'ls'.

  Write down a program that has a function named presentvalue

Write down a program that has a function named presentValue

  Write down specification for the adt as a java interface

Write down specification for the ADT as a java interface

  Application showing files name-size and last modifiaction

Make a file by utilizing any word-processing program or the text editor. Write down an application which shows the file's name, size, and time of the last modification.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd