You are to answer 5 out of the 20 chapter Review Questions found on page 44 – 45. Create a MS Word document, name the file Ch1_YourLastName (ex: Ch1_Sweeney) and submit in the provided area of Canvas. Remember yes or no answers will not work, the minimum requirement for each question is 1 paragraph (at least 4 sentences). More is welcome if needed. Be sure to number the questions you are answering for example:
5.
8.
10.
15.
18.
- What is the difference between a threat agent and a threat?
- What is the difference between vulnerability and exposure?
- How is infrastructure protection (assuring the security of utility services) related to information security?
- What type of security was dominant in the early years of computing?
- What are the three components of the C.I.A. triangle? What are they used for?
- If the C.I.A. triangle is incomplete, why is it so commonly used in security?
- Describe the critical characteristics of information. How are they used in the study of computer security?
- Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
- What system is the father of almost all modern multiuser systems?
- Which paper is the foundation of all subsequent studies of computer security?
- Why is the top-down approach to information security superior to the bottom-up approach?
- Why is a methodology important in the implementation of information security? How does a methodology improve the process?
- Which members of an organization are involved in the security system development life cycle? Who leads the process?
- How can the practice of information security be described as both an art and a sci- ence? How does security as a social science influence its practice?
- Who is ultimately responsible for the security of information in the organization?
- What is the relationship between the MULTICS project and the early development of computer security?
- How has computer security evolved into modern information security?
- What was important about Rand Report R-609?
- Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these wishes are carried out?
- Who should lead a security team? Should the approach to security be more managerial or technical?
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.