This website uses cookies to ensure you have the best experience. Learn more

Assignment#3

2264 words - 10 pages

Assignment # 2

1. Why is information security a management problem? What can management do that technology cannot?
Both general management and IT management are responsible for implementing information security to protect the ability of the organization to function.
Decision-makers in organizations must set policy and operate their organization in a manner that complies with the complex, shifting political legislation on the use of technology. Management is responsible for informed policy choices and the enforcement of decisions that affect applications and the IT infrastructures that support them. Management can also implement an effective information security program to protect the ...view middle of the document...

Just as managing payroll has more to do with management than with mathematical wage computations, managing information security has more to do with policy and its enforcement than with the technology of its implementation.
4. Has the implementation of networking technology created more or less risk for business that use information technology? Why?
Networking is usually considered to have created more risk for businesses that use information technology. This is due to the fact that potential attackers have more and readier access to these information systems when they have been networked, especially if they are interconnected to the Internet.
5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text.
When an attacker is able to control access to an asset, it can be held hostage to the attacker’s demands. For example, if an attacker is able to gain access to a set of data in a database and then encrypt that data, they may extort money or other value from the owner in order to share the encryption key so that the data can be used by the owner.
6. Why do employees constitute one of the greatest threats to information security?
Employees are the greatest threats since they are the closest to the organizational data and will have access by nature of their assignments. They are the ones who use it in everyday activities, and employee mistakes represent a very serious threat to the confidentiality, integrity, and availability of data. Employee mistakes can easily lead to the revelation of classified data, entry of erroneous data, accidental deletion or modification of data, storage of data in unprotected areas, and failure to protect information.
7. What measures can individuals take to protect against shoulder surfing?
The best way for an individual to avoid shoulder surfing is to avoid, as far as possible, the accessing of confidential information when another person is present. The individual should limit the number of times he/she accesses confidential data, and do it only when he/she is sure that nobody can observe them. One should be constantly aware of who is around when accessing sensitive information.
8. How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
The classic perception of the hacker is frequently glamorized in fictional accounts as someone who stealthily manipulates their way through a maze of computer networks, systems, and data to find the information that resolves the dilemma posed in the plot and saves the day. However, in reality, a hacker frequently spends long hours examining the types and structures of the targeted systems because he or she has to use skill, guile, or fraud to attempt to bypass the controls placed around information that is the property of someone else.
The perception of a hacker has evolved over the years. The traditional hacker profile was male, age 13-18, with limited parental...

Other Papers Like Assignment#3

Assignment 3

2906 words - 12 pages SCHOOL OF INFORMATION TECHNOLOGY MASTER OF INFORMATION TECHNOLOGY [pic] INDIVIDUAL ASSIGNMENT COVER PAGE |Name of Student |PETER J. MAKIWA | |Student Number |14299896 | |Name of Module

Bu224 Unit 3 Assignment

1439 words - 6 pages ------------------------------------------------- BU224 Unit 3 Assignment Template: Name: - Course Number: - BU224 Section Number: - 01 Unit Number: - 3 Date: - 8/16/2014 ------------------------------------------- Assignment ------------------------------------------- 1. St Atanagio is a remote island in the Atlantic. The inhabitants grow corn and breed poultry. The accompanying table shows the maximum annual

Assignment #3 Eco550

520 words - 3 pages ECO 550 Assignment #3 Game Theory and Monopolies by ECO 550 Assignment #3 1. Some games of strategy are cooperative. One example is deciding which side of the road to drive on. It doesn’t matter which side it is as long as everyone chooses the same side. Otherwise, everyone may get hurt. Driver 2 Left Right Driver 1

Unit 3 Assignment

593 words - 3 pages ? Declare Integer a = 5 Declare Integer b = 2 Declare Integer c = 3 Declare Integer result Set result = a + b * c Display result a.) it would display 11 * If the following pseudocode were an actual program, what would it display? Declare Integer num = 99 Set num = 5 Display num a.) it would display 5 Research Assignment * What is reverse engineering? the process of disassembling someone’s invention or program

It255 Assignment 3

299 words - 2 pages Melissa Burkhardt IT255 Unit 3 Assignment To begin designing a remote access control policy for The Richman Company, several configurations must take place. The Richman corp. uses In a Windows Server 2003-based native-mode domain, you can use the following three types of remote access policies: Explicit allow, the remote access policy is set to "Grant remote access permission" and the connection attempt matches the policy conditions,The

Netw204 Assignment 3

921 words - 4 pages NETW204: Assignment 2 (50 points) Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME | | Distance Vector Routing Protocols | Question | Answer | 1 | What does RIP stand for? | Routing Information Protocol | 2 | What metric does RIP use for Path Selection? | Rip uses the hop count metric in

Pa165 Unit 3 Assignment

1192 words - 5 pages Shiloh Wolfe Unit 3 Assignment PA165 Professor Gauvin June 28, 2016 FACTS: Leroy McPhillen frequented a pub called Bottom’s Up! Late one Saturday night, Leroy witnessed an intoxicated man, John, shouting obscenities at a women sitting at the table next to Leroy. The women, Jane, ignored John and continued to drink her beer. John then approached Jane, looking threatening. Leroy then stood up and asked the gentlemen to come over to the

Pad 500 Assignment 3

1629 words - 7 pages Assignment # 3 – The Concept of Program Reengineering Strayer University PAD 500: Modern Public Administration 3/10/2012 Table of Contents Abstract…..………………………………………………………………………...….3 Mayor Schell’s Policy Choices…..……..………………………………..…………....4 Mayor Schell’s Pre-Implementation and Design Strategies…………………..............5 Reengineering the Program…..………….……...………….………..……….....….….6 Conducting Assessments.……………………………………………………………..8

Written Assignment 3

877 words - 4 pages Written Assignment 3 1. What is the role of the financial system? Name and describe two markets that are part of the financial system in the U.S. economy. Name and describe two financial intermediaries. To match one person’s savings to another person’s investment. The Bond Market and the Stock Market. The Bond Market is a way for an institution to borrow directly from the public, by issuing a bond (an IOU). The Stock Market is a way for an

Contracts Assignment 3

1367 words - 6 pages will accept the Goods and pay for the Goods with the sum of fifty thousand ( $50,000.00 ) USD, paid as follows: a. down payment of 10% of the purchase price $5,000.00 on January 15, 2015; and b. the remainder of the purchase price will be paid price the goods are received. 3. The Seller and the Purchaser both acknowledge the sufficiency of this consideration. In addition to the purchase price specified in this Agreement, the

Week 3 Assignment

761 words - 4 pages Team Assignment – Ch.6 & Ch. 7 Textbook Exercises Earl Morse, Jennifer Schelper, Molly Todd, Vivian Costa 6-26 (Audit programs and assertions) Assume that you are responsible for developing an audit program for a manufacturing client that sells to over 1,400 customers. You want to ensure your audit program addresses all relevant assertions for sales and accounts receivable. Address the following question in the context of the audit

Related Essays

Assignment 3

1653 words - 7 pages ($5,000) USD on March 2,2014; and b. The remainder of the purchase price by certified check as required in clause 4 of this Agreement. 3. The Seller and the Purchaser both acknowledge the sufficiency of this consideration. In addition to the purchase price specified in this Agreement, the amount of any present or future sales, use, excise or similar tax applicable to the sale of Goods will be paid by the purchaser, or alternatively

Assignment 3

940 words - 4 pages begin with section. $ ls section* b. List the section1, section2, and section3 files only. $ ls section[1-3] c. List the intro file only. $ ls i* d. List the section1, section3, ref1, and ref3 files. 1. $ ls *[13] 2. Give an example of a command that uses grep a. With both input and output redirected. $ grep \$Id < *.c > id_list Chapter 9 Number 1 Explain the following unexpected result: $ whereis date date: /bin/date

Assignment # 3

2913 words - 12 pages : Three Rivers-Random House. Book or pamphlet by a corporation or government or other organization. College Board. (2005). Trends in college pricing 2005. New York, NY: Author. United States. Department of Homeland Security. (2004) Preparing for disaster for people with disabilities and other special needs. Washington, DC: FEMA. Points: 280 | Assignment 3: Alan Mulally, CEO, Ford Motor Company | Criteria | UnacceptableBelow 70% F

Assignment 3 4085 Words

4085 words - 17 pages Assignment 3 LONG TERM INVESTMENT DECISION The grocery food market is filled with various options for microwavable food depending on the preferences of the consumers. Instead of the traditional use of the oven many families now use the microwave because of their busy lifestyles. The variety of healthy low calorie -microwave food has made shopping much easier for today’s busy consumer. Low calorie labels are regulated by the Food and Drug