What is the meaning of the cia triad in information security

Assignment Help Computer Network Security
Reference no: EM13946713

1. What is the meaning of the CIA triad in Information Security?

2. What is the difference between Symmetric and Asymmetric Key Cryptography

3. What is SSL? What is SET? Which one is technically superior? Which one is the de-facto standard on commercial selling on the Internet?

4. Mention four advantages of Qualitative risk analysis

5. Mention four disadvantages of quantitative risk analysis

6. Define a safeguard....also known as ...................... or .........................

Define a threat

Define vulnerability

7. How do you calculate the total threat impact?

8. Give two examples of each of the following

Risk Avoidance

Risk Assurance

Risk Detection

Risk Recovery

9. What should be included in a risk analysis report? Be brief

10. Sketch the different tables for the following with one example row in each

Financial Loss table

Extent of legal implications table

Enterprise Embarrassment table

11. Sketch a Risk Analysis Matrix filled with a few suggested solutions

12. Which method(s) would you use for risk Analysis in the Military Base Network? Select your top two favorites. Explain why?

1- Vulnerability Analysis

2- Hazard Impact Analysis

3- Threat Analysis

4- Questionnaires

5- Single-time loss algorithm

13. What is the formula used for ALE? (Annualized loss expectancy or Exposure)

14. A company's premises have one chance in a million of being affected by flooding. A flood would cost the company $10 million.

What would be your budget for mitigating the effects of the flood?

Would you start stocking up sand bags in preparation of the flood?

15. A company has a chance 1 in 3,000 of being within ten miles of an earthquake epicenter measuring 5.0 on the Richter scale. The Earthquake will cause $60 million of loss.

What would be the budget for reducing or preventing that damage?

16. A company has one large router that ties all their network segments. If the router dies it will take one day to repair. There is 70% chance that failure will occur once every 24 months. The outage will cause 1000 people to be out of work for a day. The company estimates the loss of productivity to be $68,000

How much should you spend for router redundancy?

17. What is BS7799? What is ISO 17799?

18. What is the difference between the Red Book and the Orange book in US government and defense security

19. What is ITSEC?

20. What is The Common Criteria?

21. T or F In risk analysis, the value of an asset can be estimated by asking for the book value from the accountant

22. T or F Security policies usually have to be written in a policy document

23. T or F Cost Benefit analysis is probably the most important step in any risk analysis process

24. Give an example of risk avoidance

25. Give an example of risk acceptance

Reference no: EM13946713

Questions Cloud

Evaluates the performance of several popular algorithms : This paper evaluates the performance characteristics of several popular compression algorithms and explores two strategies for improving ratios without significantly impacting computation time.
How long will a d cell battery requires a current : How long will a D cell battery of 3.7V, with an ampere-hour rating of 2200mAH, that is connected in a circuit which requires a current of 20 mA?
Information to steal the victims identities : By the time the New York identity theft fraud case was solved, more than 30,000 people had suffered a total combined loss of more than $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims' credit infor..
Determine the amount of energy provided to the circuit : Suppose a dc source has a potential difference of 6.00 V and the current is 0.100 A. Determine the amount of energy provided to the circuit in 1.00 s. How much energy is transferred to the load in 1.00 hour?
What is the meaning of the cia triad in information security : What is the difference between Symmetric and Asymmetric Key Cryptography
Identifying which current topic or issue in management : Before you begin this Discussion, determine which one of the two topics or issues you examined in the Assignment due this week will still be significant 12 months from today. Search the Walden Library for at least one article that supports your pr..
Draw a block diagram of a processor : Draw a block diagram of a processor, memory, peripheral and DMA controller connected with a systemDraw a block diagram of a processor.
Construct a binary counter : Construct a binary counter that will convert a 64-kHz pulse signal into a 2-kHz square wave.
Tools and techniques the company use : Executive summary that discusses the "hows" of innovation. Specifically, focus on the details of how NIKE implements innovation and innovative processes. To do so, answer the following in the summary: - How is innovation at this company unique?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Define the principle of defense in depth

Define the principle of defense in depth. Give two examples of how the principle might be applied: one describing security measures across multiple layers of security architecture, and another describing security measures within a single layer

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Lab- vulnerability assessment

Lab: Vulnerability Assessment, Probably the most overlooked process in any type of security system is the vulnerability assessment. Vulnerability assessments are incredibly useful (and necessary) tools

  Analyze the significance of hacking

Analyze the significance of hacking in organizations and modern society. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Explain access control methods and attacks

Explain access control methods and attacks

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Key concepts from jackson and trochim-donnelly

Part I checks your understanding of key concepts from Jackson and Trochim & Donnelly. Answer the following questions: 1. Jackson even-numbered Chapter exercises (pp. 220-221; 273-275) 2. What are degrees of freedom? How are the calculated?

  Department of homeland securitys mission

Interpret the Department of Homeland Security's mission, operations and responsibilities. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd