Exercises Chapter 1
docx
keyboard_arrow_up
School
Davenport University *
*We aren’t endorsed by this school
Course
481
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by DoctorClover4954
Exercises Chapter 1
Question 1
Assume that a security model is needed to protect information used in the class you are
taking—say, the information in your course’s learning management system. Use the CNSS
model to identify each of the 27 cells needed for complete information protection. Write a
brief statement that explains how you would address the components represented in each of
the 27 cells.
The CNSS was formed in 1953 by the United States to protect information. There are twenty-
seven components to the CNSS model.
Confidentiality means only authorized personnel can use the information and stop others
from it.
Integrity means the data has not been altered in any way.
Availability means trusted people will have access to the information unimpeded.
Policy is a set of rules for everyone to abide by, and no one is above them.
Education involves teaching individuals about various policies and procedures.
Technology is the hardware and software needed to connect everything.
Storage is when information is safely installed reliably with a backup when needed.
Processing is when a person with the proper credentials can see the data.
Transmission is all information transferred with zero changes and as fast as possible.
Question 2
Consider the information stored in your personal computer. Do you currently have
information stored in your computer that is critical to your personal life? If that
information became compromised or lost, what effect would it have on you?
I have non-sensitive information stored on my computer. All critical data is stored
elsewhere.
Using the Web, research Stuxnet. When was it discovered? What kind of systems does it
target? Who created it and what is it used for?
The United States and Israel created Stuxnet in the early 2000s, but we discovered it in
2010 after it decimated the Iranian nuclear program. Stuxnet targets the programmable logic
controllers that are used in automation processes. There was a virus that affected computers the
same way as Stuxnet did.
Search the Web for “The Official Phreaker’s Manual.” What information in this manual
might help a security administrator to protect a communications system?
The manual provides an in-depth guide to accessing telecommunications systems without
any cost. Comprising five comprehensive chapters, it has valuable insights on work around these
systems. An administrator could utilize this manual to safeguard their systems by staying
informed about potential telecommunications and network security threats.
The chapter discussed many threats and vulnerabilities to information security. Using the
Web, find at least two other sources of information about threats and vulnerabilities. Begin
with www.securityfocus.com and use a keyword search on “threats.”
I found
https://www.bleepingcomputer.com/tag/vulnerability/
and
use
https://thehackernews.com/search/label/Vulnerability
. It is full of cool hacks, exploits, and
vulnerabilities.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help