Chapter 1-Introduction to Information Security:
1. What is the difference between a threat and a threat agent?
A threat is a constant danger to an asset, whereas a threat agent is the facilitator
of an attack.
2. What is the difference between vulnerability and exposure?
Vulnerability: is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage.
Exposure: is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.
3. How is infrastructure protection (assuring the security of utility services) related to information security?
Integrity: whole and uncorrupted, integrity of the info is threatened when the info is exposed to corruption, damage, destruction or other of its authentic state.
Utility: has a value for some purpose.
8. Identify the five components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
Software: component of IS comprises applications, operating systems and assorted command utilities.
- most difficult component to secure
Hardware: Physical technology that houses and executes the software, stores and transport the data and provides interfaces for the entry and removal od the info form the system.
- Physical security polices that deal with hardware a physical assets and with the protection of physical assets from harm and theft.
Data: Data stared, processed and transmitted by a computer system must be protected
- often the most valuable asset processed by the organization and is the main target of internal attacks.
- By the use of database mgmt. systems data and the application can be protected.
People: Have always been a threat to info security (often overlooked)
Procedures: written instruction for accomplishing an specific task.
9. In the history of the study of computer security, what system is the father of almost all modern multiuser systems?
Mainframe computer systems
10. What paper is the foundation of all subsequent studies of computer security?
Rand Report R-609
11. Why is the top down approach to information security superior to the bottom up approach?
Bottom up lacks a number of critical features such as participant support and organizational staying power, whereas top down has strong upper management support, dedicated funding, clear planning and the opportunity to influence organizations culture.
12. Why is a methodology important in the implementation of information security? How does a methodology improve the process?
A formal methodology ensures a rigorous process and avoids missing steps.