What is the itsec

Assignment Help Computer Engineering
Reference no: EM1327028

1. What is the meaning of the CIA triad in Information Security?

2. What is the difference between Symmetric and Asymmetric Key Cryptography

3. What is SSL? What is SET? Which one is technically superior? Which one is the de-facto standard on commercial selling on the Internet?

4. Mention four advantages of Qualitative risk analysis

5. Mention four disadvantages of quantitative risk analysis

6. Define a safeguard....also known as ...................... or .........................

Define a threat

Define vulnerability

7. How do you calculate the total threat impact?

8. Give two examples of each of the following

Risk Avoidance

Risk Assurance

Risk Detection

Risk Recovery

9. What should be included in a risk analysis report? Be brief

10. Sketch the different tables for the following with one example row in each

Financial Loss table

Extent of legal implications table

Enterprise Embarrassment table

11. Sketch a Risk Analysis Matrix filled with a few suggested solutions

12. Which method(s) would you use for risk Analysis in the Military Base Network?
Select your top two favorites. Explain why?

1- Vulnerability Analysis
2- Hazard Impact Analysis
3- Threat Analysis
4- Questionnaires
5- Single-time loss algorithm

13. What is the formula used for ALE? (Annualized loss expectancy or Exposure)

14. A company's premises have one chance in a million of being affected by flooding. A flood would cost the company $10 million.

What would be your budget for mitigating the effects of the flood?

Would you start stocking up sand bags in preparation of the flood?

15. A company has a chance 1 in 3,000 of being within ten miles of an earthquake epicenter measuring 5.0 on the Richter scale. The Earthquake will cause $60 million of loss.

What would be the budget for reducing or preventing that damage?

16. A company has one large router that ties all their network segments. If the router dies it will take one day to repair. There is 70% chance that failure will occur once every 24 months. The outage will cause 1000 people to be out of work for a day. The company estimates the loss of productivity to be $68,000

How much should you spend for router redundancy?

17. What is BS7799? What is ISO 17799?

18. What is the difference between the Red Book and the Orange book in US government and defense security

19. What is ITSEC?

20. What is The Common Criteria?

21. T or F In risk analysis, the value of an asset can be estimated by asking for the book value from the accountant

22. T or F Security policies usually have to be written in a policy document

23. T or F Cost Benefit analysis is probably the most important step in any risk analysis process

24. Give an example of risk avoidance

25. Give an example of risk acceptance

Reference no: EM1327028

Questions Cloud

Knowledge of agency level enterprise operating systems : information of advanced Relational Database management Systems (RDMS) operating over a wide-area network. (note: Please explain RDMS operating over a WAN.)
What is value added in every sector also total output : What is value added in every sector also what is total output for the economy.
Conditions for allocating lease to another party : Several months into the term, a competitor unexpectedly releases a new game title featuring play that would make your game appear to be a poorly crafted imitation.
Finding standard deviation of waiting time : The frequency distribution below summarizes the results. Find the standard deviation.
What is the itsec : What is the meaning of CIA triad in Information Security.What is the difference between Symmetric and Asymmetric Key Cryptography
A number of lossless text compression algorithms exist : A number of lossless text compression algorithms exist, though , none of these methods is able to consistently reach its theoretical best-case compression ratio.
Theory galbraiths of consumer demand has an important : Theory Galbraiths of consumer demand has an important implication in terms of underallocation of resources to public goods.
Explaining the intent of law : How the US Constitution is applied is a good illustration of the struggle between discerning the letter of the law and the spirit of the law.
Leadership to centralize the power and decision making : Should the leadership try to centralize the power and decision making or decentralize the operation?

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  How the project management life cycle be efficient

How the Project Management Life Cycle be efficient.

  Give description on wireless communication

As an IT consultant, you have been tasked to implement wireless communication for a car company with about with 1500 associates. In four locations.

  Execute the boolean functions

Execute the Boolean functions

  Key elements of an entry strategy

Write down the key elements of an entry strategy, especially for the high-tech environment? The answer requires to be of at least 300 words. Also include any references

  Displaying recent entries of windows security event log

Issue a command which will show 100 most recent entries within the Windows security event log displaying only those entries which were a successful logon event by the Interactive logon.

  Discuss how these business rules could be set up

How can the above business rules be set up in a database and reinforced using DCL.

  Developing a pseudocode and the flowchart

Develop a flowchart and write down the psuedocode for the following: A program which prints every number from 1 through 10. A program which prints every number from 1 through 10 along with its square and cube.

  Configuring a database

Configuring a Database

  Differentiated services and set of contiguous routers

Explain in scholarly detail why the differentiated services (DS) domain consists of the set of contiguous routers?

  Constructing truth table of converter circuit

Construct the truth table of the converter circuit using character a , b, c and d (d represents Least Significant Bit) in order to denote the literals input of BCD. Use w, x, y and z (z as Least Significant Bit) in order to represent the output li..

  Modifying the label properties

Perform some of the changes, the WebTime example to consists of drop-down lists that enable the user to alter such Label properties as the BackColor, ForeColor and Font-Size.

  Recommend a removable storage backup

Managers want to be able to print schedules on any printer at any restaurant if traveling and in a motel with a laptop. Please explain what you would have to do to allow managers to do this and how they will reference the printer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd