What is the meaning of the cia triad in information security

Assignment Help Computer Network Security
Reference no: EM13946713

1. What is the meaning of the CIA triad in Information Security?

2. What is the difference between Symmetric and Asymmetric Key Cryptography

3. What is SSL? What is SET? Which one is technically superior? Which one is the de-facto standard on commercial selling on the Internet?

4. Mention four advantages of Qualitative risk analysis

5. Mention four disadvantages of quantitative risk analysis

6. Define a safeguard....also known as ...................... or .........................

Define a threat

Define vulnerability

7. How do you calculate the total threat impact?

8. Give two examples of each of the following

Risk Avoidance

Risk Assurance

Risk Detection

Risk Recovery

9. What should be included in a risk analysis report? Be brief

10. Sketch the different tables for the following with one example row in each

Financial Loss table

Extent of legal implications table

Enterprise Embarrassment table

11. Sketch a Risk Analysis Matrix filled with a few suggested solutions

12. Which method(s) would you use for risk Analysis in the Military Base Network? Select your top two favorites. Explain why?

1- Vulnerability Analysis

2- Hazard Impact Analysis

3- Threat Analysis

4- Questionnaires

5- Single-time loss algorithm

13. What is the formula used for ALE? (Annualized loss expectancy or Exposure)

14. A company's premises have one chance in a million of being affected by flooding. A flood would cost the company $10 million.

What would be your budget for mitigating the effects of the flood?

Would you start stocking up sand bags in preparation of the flood?

15. A company has a chance 1 in 3,000 of being within ten miles of an earthquake epicenter measuring 5.0 on the Richter scale. The Earthquake will cause $60 million of loss.

What would be the budget for reducing or preventing that damage?

16. A company has one large router that ties all their network segments. If the router dies it will take one day to repair. There is 70% chance that failure will occur once every 24 months. The outage will cause 1000 people to be out of work for a day. The company estimates the loss of productivity to be $68,000

How much should you spend for router redundancy?

17. What is BS7799? What is ISO 17799?

18. What is the difference between the Red Book and the Orange book in US government and defense security

19. What is ITSEC?

20. What is The Common Criteria?

21. T or F In risk analysis, the value of an asset can be estimated by asking for the book value from the accountant

22. T or F Security policies usually have to be written in a policy document

23. T or F Cost Benefit analysis is probably the most important step in any risk analysis process

24. Give an example of risk avoidance

25. Give an example of risk acceptance

Reference no: EM13946713

Questions Cloud

Evaluates the performance of several popular algorithms : This paper evaluates the performance characteristics of several popular compression algorithms and explores two strategies for improving ratios without significantly impacting computation time.
How long will a d cell battery requires a current : How long will a D cell battery of 3.7V, with an ampere-hour rating of 2200mAH, that is connected in a circuit which requires a current of 20 mA?
Information to steal the victims identities : By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss of more than $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims' credit infor..
Determine the amount of energy provided to the circuit : Suppose a dc source has a potential difference of 6.00 V and the current is 0.100 A. Determine the amount of energy provided to the circuit in 1.00 s. How much energy is transferred to the load in 1.00 hour?
What is the meaning of the cia triad in information security : What is the difference between Symmetric and Asymmetric Key Cryptography
Identifying which current topic or issue in management : Before you begin this Discussion, determine which one of the two topics or issues you examined in the Assignment due this week will still be significant 12 months from today. Search the Walden Library for at least one article that supports your pr..
Draw a block diagram of a processor : Draw a block diagram of a processor, memory, peripheral and DMA controller connected with a systemDraw a block diagram of a processor.
Construct a binary counter : Construct a binary counter that will convert a 64-kHz pulse signal into a 2-kHz square wave.
Tools and techniques the company use : Executive summary that discusses the "hows" of innovation. Specifically, focus on the details of how NIKE implements innovation and innovative processes. To do so, answer the following in the summary: - How is innovation at this company unique?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Differentiate business continuity-disaster recovery planning

Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.

  Report on information security planning and policy

Write a research report on information security planning and policy. Based on information security planning and policy around 3000 words.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Evaluate the physical security infrastructure

Evaluate the physical security infrastructure at your school or place of business - We can't forget about physical security! After reading through the SANS Physical Security checklist attached here, evaluate the physical security infrastructure at ..

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  What security functions are typically outsourced

What security functions are typically outsourced?

  Determine changes to existing security policies

Determine changes to existing security policies needed to make the NVCC bookstore Web site more secure.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Wireless-hardware hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old).

  Investigate and report on the current state of organisation

Investigate and report on the current state of organisation - Write a research paper and organise it in the way - adopt to improve security.

  Investigate the development on massive mimo technology

Investigate the development on massive MIMO technology and prepare a brief report of around 1400 words. Your references may come from websites, white papers, government documents or published conference or journal papers.

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd