Date Taken: 9/6/2014
Time Spent: 1 h , 03 min , 54 secs
Points (90%)
Received:
Question Type: # Of Questions: #
Correct:
Multiple Choice 2 2
Essay 4 N/A
Question 1. Question
: (TCO A) Describe an organizational information situation
where data integrity would be more important than data
availability or confidentiality.
The first thing that comes to mind is the Cloud where the data could
Student Answer: be compromised even though you have the ease of going to any
computer and pulling it off the Cloud's server. But the problem is, just
as with any other server, it can be compromised. For example if a
doctor puts their patients private information on the Cloud and that
server gets hacked, all the patients information has been
compromised.
Instructor
Examples include: Bank transactions, stock brokerage
Explanation:
transactions, election results (Pfleeger Ch 1, pp.10–12)
Points Received: 10 of 10
Comments:
Question 2. Question :
(TCO A) Which of the following is the strongest password?
Student Answer: Xo795&A
&cGo9Tz
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 07:12:19 GMT -06:00
https://www.coursehero.com/file/10735849/SE571-Week-1-Quiz/
, F5h#3u9g
vU7#$3T
sC9$d&c
Instructor All contain upercase, lowercase, numbers and special characers. Option
#3 has 8
Explanation: characters while the others have seven. Option #3 would be
harder to crack. (Pfleeger Ch 4, pps. 229–230)
Points Received: 5 of 5
Comments:
Question 3. Question :
(TCO A) While our focus in the course is on threats to
information
systems, this question focuses on the concept of threats,
vulnerabilities, and controls as applied to other kinds of
systems. Select two examples of threats to boats/ships for
which manufactures and/or regulators have instituted controls.
Describe the vulnerabilities for which the controls were
created and assess the effectiveness of these controls giving
the justification for your assessment. Your answer does not
need to address information security but you need to
demonstrate your understanding of the terms: threat,
vulnerability, and control. (Note: specific answers to this
question are not in the assigned reading material.)
Student Answer: One example of threats with ships/boats for manufactures is the USS
Cole. So the two examples are terrorism from pirates and other
small boats and other forms of terrorism in general. To combat
these threats the manufacturers and retailers have instituted control
systems such as water surveillance from the Coast Guard. The Coat
Guard tracks all commercial boats, cruises, and anything on the
water. They will determine from the information that they have
gathered if the boats is a threat or simply one going about its day to
day routine.
Instructor Explanation: Threat: loss of passenger life if vessel sinks,Vulnerability:
passenger can't swim, Control: life jacket,Effectiveness: fair:
water temperature, current can lead to death despite jacket.
Threat: damage to boat or persons due to poor operator
performance, Vulnerability: operator abuses substances,Control:
legal
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 07:12:19 GMT -06:00
https://www.coursehero.com/file/10735849/SE571-Week-1-Quiz/
Time Spent: 1 h , 03 min , 54 secs
Points (90%)
Received:
Question Type: # Of Questions: #
Correct:
Multiple Choice 2 2
Essay 4 N/A
Question 1. Question
: (TCO A) Describe an organizational information situation
where data integrity would be more important than data
availability or confidentiality.
The first thing that comes to mind is the Cloud where the data could
Student Answer: be compromised even though you have the ease of going to any
computer and pulling it off the Cloud's server. But the problem is, just
as with any other server, it can be compromised. For example if a
doctor puts their patients private information on the Cloud and that
server gets hacked, all the patients information has been
compromised.
Instructor
Examples include: Bank transactions, stock brokerage
Explanation:
transactions, election results (Pfleeger Ch 1, pp.10–12)
Points Received: 10 of 10
Comments:
Question 2. Question :
(TCO A) Which of the following is the strongest password?
Student Answer: Xo795&A
&cGo9Tz
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 07:12:19 GMT -06:00
https://www.coursehero.com/file/10735849/SE571-Week-1-Quiz/
, F5h#3u9g
vU7#$3T
sC9$d&c
Instructor All contain upercase, lowercase, numbers and special characers. Option
#3 has 8
Explanation: characters while the others have seven. Option #3 would be
harder to crack. (Pfleeger Ch 4, pps. 229–230)
Points Received: 5 of 5
Comments:
Question 3. Question :
(TCO A) While our focus in the course is on threats to
information
systems, this question focuses on the concept of threats,
vulnerabilities, and controls as applied to other kinds of
systems. Select two examples of threats to boats/ships for
which manufactures and/or regulators have instituted controls.
Describe the vulnerabilities for which the controls were
created and assess the effectiveness of these controls giving
the justification for your assessment. Your answer does not
need to address information security but you need to
demonstrate your understanding of the terms: threat,
vulnerability, and control. (Note: specific answers to this
question are not in the assigned reading material.)
Student Answer: One example of threats with ships/boats for manufactures is the USS
Cole. So the two examples are terrorism from pirates and other
small boats and other forms of terrorism in general. To combat
these threats the manufacturers and retailers have instituted control
systems such as water surveillance from the Coast Guard. The Coat
Guard tracks all commercial boats, cruises, and anything on the
water. They will determine from the information that they have
gathered if the boats is a threat or simply one going about its day to
day routine.
Instructor Explanation: Threat: loss of passenger life if vessel sinks,Vulnerability:
passenger can't swim, Control: life jacket,Effectiveness: fair:
water temperature, current can lead to death despite jacket.
Threat: damage to boat or persons due to poor operator
performance, Vulnerability: operator abuses substances,Control:
legal
This study source was downloaded by 100000861168648 from CourseHero.com on 03-07-2023 07:12:19 GMT -06:00
https://www.coursehero.com/file/10735849/SE571-Week-1-Quiz/