Exercises Chapter 1

docx

School

Davenport University *

*We aren’t endorsed by this school

Course

481

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by DoctorClover4954

Report
Exercises Chapter 1 Question 1 Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells. The CNSS was formed in 1953 by the United States to protect information. There are twenty- seven components to the CNSS model. Confidentiality means only authorized personnel can use the information and stop others from it. Integrity means the data has not been altered in any way. Availability means trusted people will have access to the information unimpeded. Policy is a set of rules for everyone to abide by, and no one is above them. Education involves teaching individuals about various policies and procedures. Technology is the hardware and software needed to connect everything. Storage is when information is safely installed reliably with a backup when needed. Processing is when a person with the proper credentials can see the data. Transmission is all information transferred with zero changes and as fast as possible.
Question 2 Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? I have non-sensitive information stored on my computer. All critical data is stored elsewhere. Using the Web, research Stuxnet. When was it discovered? What kind of systems does it target? Who created it and what is it used for? The United States and Israel created Stuxnet in the early 2000s, but we discovered it in 2010 after it decimated the Iranian nuclear program. Stuxnet targets the programmable logic controllers that are used in automation processes. There was a virus that affected computers the same way as Stuxnet did. Search the Web for “The Official Phreaker’s Manual.” What information in this manual might help a security administrator to protect a communications system? The manual provides an in-depth guide to accessing telecommunications systems without any cost. Comprising five comprehensive chapters, it has valuable insights on work around these systems. An administrator could utilize this manual to safeguard their systems by staying informed about potential telecommunications and network security threats. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information about threats and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on “threats.”
I found https://www.bleepingcomputer.com/tag/vulnerability/ and use https://thehackernews.com/search/label/Vulnerability . It is full of cool hacks, exploits, and vulnerabilities.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help