What is the principle of adequate protection

Assignment Help Other Subject
Reference no: EM13863076

Part 1:

True or False Questions .

1. T F There is only one way to calculate economic value to justify investments in security measures. Answer: _____


2. T F A business continuity plan explains how an organization will maintain operational capabilities during an incident, while an incident response describes how the organization will handle the security incident itself. Answer: ____


3. T F Viruses infect hardware and executable files. Answer: _____


4. T F A fence register protects an operating system from a user, but does not protect the user from other users. Answer: _____


5. T F In conducting a risk analysis, it is often not possible to directly estimate the probability of an event. Answer: _____


6. T F A security policy that by default provides no access rights is an example of least privilege. Answer: _____


7. T F A security policy, no matter how well written, may need revision from time to time. Answer: _____


8. T F With unlimited resources and security controls, it is possible to reduce risk to zero. Answer: _____


9. T F A database management system with perfect user access controls would have no integrity vulnerability. Answer: _____


10. T F Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security. Answer: _____

Part 2: Short Answers (10 points each). Please answer briefly and completely, and cite all sources of information. 

  1. What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?
  1. What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability. 
  1. Describe the fundamental principles in both the Bell-LaPadula and Biba security models. For each, explain what sort of security the model is intended to provide, the two key properties of the model, and then explain in your own words why each of the properties makes sense from a security standpoint. 
  1. Describe the similarities and differences between a virus, a Trojan horse, and a worm. Give examples of controls that could be implemented to mitigate the threat of each of these types of malicious code. 
  1. What is the difference between inference and aggregation? Give an example of each, and describe at least one way to mitigate each type of vulnerability. 
  1. Cite a risk in computing for which it is impossible or infeasible to develop a classical probability of occurrence.  Why?

 Part 3: Short Essay (30 points). Please restrict your answer to three (3) pages (double spaced) or less. 

Global Corporation, Inc. (GCI) is a fictional multi-national company providing outsourced financial services to a variety of clients across many industries, including commercial and government entities. GCI specializes in billing and invoicing services, in which GCI receives relevant data from its clients and processes the data to produce the invoices, monthly statements, and other billing items that are sent to the customers of GCI's clients. GCI employees serve the company's customers both on-site at customer locations and while working in GCI facilities. GCI employees routinely store data related to multiple clients on their company-issued laptops. 

GCI's Chief Information Officer, having read of the numerous data breaches reported among commercial and government organizations, has become concerned about the risk to GCI's customers and potentially the company's reputation if GCI were to experience a similar breach. She has tasked you, the Director of Information Security, to create a new corporate policy regarding the protection of client and company confidential data stored on employee computers, particularly including laptops. Respond to each of the following, taking into account material we have studied in this course regarding threats and vulnerabilities, as well as  Pfleeger's discussion of the characteristics of effective security policies in chapter 8 of the text. Cite these and other pertinent sources used in your answer. Be specific and briefly but fully explain and give reasons for your answers.

  1. Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company? 
  1. What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a). 

Write a succinct policy statement specifying employee and company responsibilities for protecting client and corporate data, such as the data stored on employee laptops. Be sure to address requirements for protecting the data from theft, and for rendering the data unusable should it be compromised.

Reference no: EM13863076

Questions Cloud

What did jackson report as net sales on its income statement : In 2002, jackson incorporated had gross sales of $4269200. for 2002, management estimated that returns and allowances would be 5 percent of gross sales. what did jackson report as net sales on its 2002 income statement?
What steps would you take to attempt to turn office morale : What steps would you take to attempt to turn office morale and employee performance around? Be sure to discuss opportunities for employee education and training, and how the promotion of lifelong learning in the workplace for both you and your emp..
Brief report on micro heat pipes : I want a brief report on "Micro Heat Pipes". (It should cover What are Micro heat pipes, where they are used, why they are used, advantages, disadvantages, applications, any changes/improvements to be made, future of these micro heat pipes.
Differences between express and implied contracts : Explain the differences between express and implied contracts. What steps can an organization take to minimize the formation of implied contracts of employment
What is the principle of adequate protection : What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?
Prepare a report regarding renewable energy : Prepare a 3000 words report regarding renewable energy including 12 references. You are required to submit a report on renewable energy produced by solar photovoltaic technology.
Calculate the discounted payback period for each project : Calculate the payback period for each project and calculate the discounted payback period for each project.
Investigate and critically assess an existing tool design : The aim of the project is to enable you to investigate and critically assess an existing tool design or processand develop ways in which improvements could be made.
How does target compete against mammoth walmart : How does Target compete against mammoth Walmart? What are the distinct differences in their IMC strategies? Did Target do the right thing by tweaking its message to focus more on value and less on trends? Why or why not

Reviews

Write a Review

Other Subject Questions & Answers

  Explain mathematical contributions of john nash

Write down paper (4-7 pages double spaced) on Mathematical Contributions of John Nash, using at least 3 sources (one has to be book).

  Explain the effect of relationships among television-movies

Explain the effect of relationships among television, movies, and electronic games with culture. Include the following: How culture is reflected in movies and television?

  The blind spot in the eye

The blind spot in the eye is

  How to identify the various complications of neonatal sepsis

How to identify the various complications of neonatal sepsis?

  Analyze the effects of social-cultural-political influences

Analyze the effects of the social, cultural, and political influences in the delivery of health care services as they specifically pertain to quality improvement and risk management to the health care organization and patients served.

  Natural disasters resulted in several thousand deaths

Which of the following natural disasters resulted in several thousand deaths and billions of dollars in infrastructure and agriculture damage? Two volcanoes along the Mexico/Guatemala border are part of which of the following?

  History of commercial media

The origins of the Internet and the World Wide Web are unusual in the history of commercial media. What makes them unusual and what qualities does that impart to the medium

  Research studies related to human services management

locate a journal article that describes academic research studies related to human services management.

  Difference between a workbook and a worksheet

What is the difference between a workbook and a worksheet? Why would you want to use separate worksheets when using Excel? Please give 2 general examples. Please research and find the method for creating an Excel formula that references information o..

  Assignment on community prevention program

Assignment on Community Prevention Program

  Murder investigation bring about critism-media pressure

The many questions associated with serial murder investigation bring about critism and public media pressure.There is a globaliztion to serial murder investigation.identify and discuss the investigative tools and approaches used by law enforcement he..

  Presidential powers influencing crime control policy

Define and discuss the Presidential powers used to influence crime control policy and what powers the President can use as well as the sources of those powers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd