What is the itsec

Assignment Help Computer Engineering
Reference no: EM1327028

1. What is the meaning of the CIA triad in Information Security?

2. What is the difference between Symmetric and Asymmetric Key Cryptography

3. What is SSL? What is SET? Which one is technically superior? Which one is the de-facto standard on commercial selling on the Internet?

4. Mention four advantages of Qualitative risk analysis

5. Mention four disadvantages of quantitative risk analysis

6. Define a safeguard....also known as ...................... or .........................

Define a threat

Define vulnerability

7. How do you calculate the total threat impact?

8. Give two examples of each of the following

Risk Avoidance

Risk Assurance

Risk Detection

Risk Recovery

9. What should be included in a risk analysis report? Be brief

10. Sketch the different tables for the following with one example row in each

Financial Loss table

Extent of legal implications table

Enterprise Embarrassment table

11. Sketch a Risk Analysis Matrix filled with a few suggested solutions

12. Which method(s) would you use for risk Analysis in the Military Base Network?
Select your top two favorites. Explain why?

1- Vulnerability Analysis
2- Hazard Impact Analysis
3- Threat Analysis
4- Questionnaires
5- Single-time loss algorithm

13. What is the formula used for ALE? (Annualized loss expectancy or Exposure)

14. A company's premises have one chance in a million of being affected by flooding. A flood would cost the company $10 million.

What would be your budget for mitigating the effects of the flood?

Would you start stocking up sand bags in preparation of the flood?

15. A company has a chance 1 in 3,000 of being within ten miles of an earthquake epicenter measuring 5.0 on the Richter scale. The Earthquake will cause $60 million of loss.

What would be the budget for reducing or preventing that damage?

16. A company has one large router that ties all their network segments. If the router dies it will take one day to repair. There is 70% chance that failure will occur once every 24 months. The outage will cause 1000 people to be out of work for a day. The company estimates the loss of productivity to be $68,000

How much should you spend for router redundancy?

17. What is BS7799? What is ISO 17799?

18. What is the difference between the Red Book and the Orange book in US government and defense security

19. What is ITSEC?

20. What is The Common Criteria?

21. T or F In risk analysis, the value of an asset can be estimated by asking for the book value from the accountant

22. T or F Security policies usually have to be written in a policy document

23. T or F Cost Benefit analysis is probably the most important step in any risk analysis process

24. Give an example of risk avoidance

25. Give an example of risk acceptance

Reference no: EM1327028

Questions Cloud

Knowledge of agency level enterprise operating systems : information of advanced Relational Database management Systems (RDMS) operating over a wide-area network. (note: Please explain RDMS operating over a WAN.)
What is value added in every sector also total output : What is value added in every sector also what is total output for the economy.
Conditions for allocating lease to another party : Several months into the term, a competitor unexpectedly releases a new game title featuring play that would make your game appear to be a poorly crafted imitation.
Finding standard deviation of waiting time : The frequency distribution below summarizes the results. Find the standard deviation.
What is the itsec : What is the meaning of CIA triad in Information Security.What is the difference between Symmetric and Asymmetric Key Cryptography
A number of lossless text compression algorithms exist : A number of lossless text compression algorithms exist, though , none of these methods is able to consistently reach its theoretical best-case compression ratio.
Theory galbraiths of consumer demand has an important : Theory Galbraiths of consumer demand has an important implication in terms of underallocation of resources to public goods.
Explaining the intent of law : How the US Constitution is applied is a good illustration of the struggle between discerning the letter of the law and the spirit of the law.
Leadership to centralize the power and decision making : Should the leadership try to centralize the power and decision making or decentralize the operation?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Photoshop cs5 and cs5

Explain the programs that are available in order to edit the images? Explain at least two of the attributes available in the Photoshop CS5 and CS5.

  Why is contingency planning important for management

Why is contingency planning important for management? Specifically in the Information Technology field or department.

  Evaluating the code

Which of the following best explains the situation after Line 1 has been executed? pCdoesnothaveatarget, and pCdoesnothaveaknownvalue. pCdoesnothaveatarget, butpCdoeshaveaknownvalue.

  How many register windows must be saved to memory

How many register windows must be saved to memory.

  What security measures required to address vulnerabilities

What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company.

  How to use the schedule performance index

Use CPI to calculate the estimate at completion (EAC) for this project. Is the project performing better or worse than planned.

  Explain the method to find cost of sorting the relation

Explain the method to find cost of sorting the relation In each case, how many combine passes are required?

  Identify and classify the it infrastructure components

Identify core and side business activities of UPS and explain how same are driven by technology, Identify and classify the IT infrastructure components available at UPS and its subsidiaries

  Why employees may leave the company

Do you think that it is acceptable for organizations to try to lock employees into a work term after training? In other words, if they send an employee on the training course that could have tremendous benefit to the organization, should they be a..

  Aspect of software engineering

Select a topic related to some aspect of the Software Engineering. Write about 2500+ word (minimum) paper on that particular topic-single spaced 12 pt times or times new roman font.

  Create a security policy company explaining network security

Sunica Music and Movies is the local multimedia chain with four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory.

  What is network architecture

what is the most popular network architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd