PRIYA LR&CFS QUIZ-1

docx

School

Southeast Missouri State University *

*We aren’t endorsed by this school

Course

650

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by GeneralExploration6683

Report
NAME: PUSHPA PRIYA MIKKILI SEMO.ID: S02048083 CY-650 Legal, Risk, and Compliance for Security QUIZ-1 1. What is the difference between a threat agent and a threat? Threat - Anything that could potentially negatively impact operations and resources. Threat Agent - Threat agents can be people, things, or anything else that starts an attack to steal or compromise an organization's data or physical assets. 2. What is the difference between vulnerability and exposure? Vulnerability: Any imperfection in the system, such as a software package defect, an unlocked door, or an exposed system port, is called a vulnerability. It exposes objects to harm or attack. Exposure: A system is exposed when it is vulnerable to harm for a single occurrence. Vulnerabilities can lead to exposure. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The availability of information assets depends on information systems that are trustworthy and sustain high availability. 4. What type of security was dominant in the early years of computing? Physical security dominated computing in its early years. 5. What are the three components of the C.I.A. triangle? What are they used for? The three components of the C.I.A stand for i. Confidentiality. ii. Integrity. iii. Availability. Confidentiality: Accessing the information should only be possible for those who are authorized to. Integrity: Sent data must be received exactly as sent. Availability: Data access should be restricted to those who are authorized to use it.
-----THE END-----
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help