Privacy Issues: what information about oneself should an individual be required to reveal to others?
Accuracy Issues: who is responsible for the authenticity, fidelity, and accuracy of the information collected?
Property Issues: Who owns the information?
Accessibility: Who is allowed to access information?
2. What are the 4 general types of IT threats? Provide an example for each one
There are 5 general types of IT threats. These threats include:
-Unintentional Acts- human error
-Natural Disaster- floods, earthquakes etc resulting in loss of system and data
-Technical Failures- problems with hardware and software
-Management Failures- lack of funding for information security efforts and a lack of interest in those efforts
Deliberate Acts- espionage, information extortion, identity thefts etc.
3. Describe/discuss three types of software attack and a problem that may result from them
Three types of software attacks include:
-Virus- performs malicious actions by attaching to another computer program
-Back Door- allows the hacker to access a computer system at will, without having to go through any security procedures
-Zero Day Attack- allows the perpetrator to attack the vulnerability of a software product before the software vendor can prepare a patch for the vulnerability
4. Describe the four major types of security controls in relation to protecting information systems.
The four major types of security controls in relation to protecting information systems are:
-Communication Controls- secure the movement of data across networks.
-Application Controls- security counter-measures that protect specific applications. The three major categories of these controls are input, processing and output controls
-Physical Controls- prevent unauthorised individuals form gaining access to a company's facilities
-Access Controls- restrict unauthorised individuals from using information resources
5. Name one recent software threat and briefly discuss it's effects and resolutions?
One type of software threat is a computer virus. This is where segment of computer code that performs malicious actions by attaching to another computer program. In order to stop viruses, people can use anit-malware systems. This is a software package that attempts to identify and emilinate viruses, worms and other malicious software. There are hundreds of these packages available, for example Norton Anti Virus, McAfee Virusscan and Trend Micro PC-cillin
No comments:
Post a Comment