Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
16-11-2024
Geschreven in
2024/2025

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials! Information assets Data, device or component that supports information related activities. Need to be protected from illicit access, use, disclosure, alteration, destruction and theft. Types of Assets 1. Property - Physical assets e.g. buildings and contents - Hardware - Software (OS, apps, support systems) - Data 2. People - Employees - Contractors - Customers/Clients 3. Procedures Information security Preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved. Information Security Event An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant. Information Security Incident A single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security. Asset States 1. Storage - electronic, physical, human 2. Transmission - physical or electronic 3. Processing (use) - physical or electronic Cyber crime a) Technology is the target e.g. hacking, computer viruses, DOS. b) Technology used as tools to enable the offence e.g. Phishing, identity theft, spam. Ransomware Malware that encrypts users computer files and demands a payment to permit decryption e.g. Breaking Bad computer ransomware demanded $1000 to decrypt files it infects. 3 Information security goals 1. Confidentiality 2. Integrity 3. Availability Confidentiality Prevent unauthorized DISCLOSURE of information. Integrity Prevent unauthorized MODIFICATION or DESTRUCTION of information. Availability Ensure resources ACCESSIBLE when required by authorized user. Authentication Verifying a claimed identity or source of information. 2 types of Authentication 1. Entity Authentication 2. Data origin authentication Entity Authentication Verify claimed identity. Data Origin Authentication Verify source and integrity of message. Non-repudiation Create evidence that action has occurred, so user cannot falsely deny the action later. 2 Types of Attacks 1. Passive 2. Active Active Attacks - Goal is to modify, replicate of fabricate. - Can detect and try to recover e.g. phishing, DOS, Main-in-the-middle Passive Attacks - Goal is to obtain information - Difficult to detect e.g. eavesdropping, shoulder surfing. 3 Types of Countermeasures 1. Preventative controls 2. Detective controls 3. Corrective controls Example of Preventative controls Encryption of files Example of Detective controls Use checksum/MAC to detect data corruption. Example of Corrective controls Restore apps to last known good image to bring corrupted system back online. What are the 3 sides of the Security Model? What is on each side? 1. Information States (top) . Transmission . Storage

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!

Information assets
Data, device or component that supports information related activities. Need to be
protected from illicit access, use, disclosure, alteration, destruction and theft.
Types of Assets
1. Property
- Physical assets e.g. buildings and contents
- Hardware
- Software (OS, apps, support systems)
- Data
2. People
- Employees
- Contractors
- Customers/Clients
3. Procedures
Information security
Preservation of confidentiality, integrity and availability of information; in addition, other
properties such as authenticity, accountability, non-repudiation and reliability can also
be involved.
Information Security Event
An identified occurrence of a system, service or network state indicating a possible
breach of information security policy or failure of safeguards, or a previously unknown
situation that may be security relevant.
Information Security Incident
A single or a series of unwanted or unexpected information security events that have a
significant probability of compromising business operations and threatening information
security.
Asset States
1. Storage
- electronic, physical, human
2. Transmission
- physical or electronic
3. Processing (use)
- physical or electronic
Cyber crime
a) Technology is the target e.g. hacking, computer viruses, DOS.

b) Technology used as tools to enable the offence e.g. Phishing, identity theft, spam.
Ransomware
Malware that encrypts users computer files and demands a payment to permit
decryption e.g. Breaking Bad computer ransomware demanded $1000 to decrypt files it
infects.

,3 Information security goals
1. Confidentiality
2. Integrity
3. Availability
Confidentiality
Prevent unauthorized DISCLOSURE of information.
Integrity
Prevent unauthorized MODIFICATION or DESTRUCTION of information.
Availability
Ensure resources ACCESSIBLE when required by authorized user.
Authentication
Verifying a claimed identity or source of information.
2 types of Authentication
1. Entity Authentication
2. Data origin authentication
Entity Authentication
Verify claimed identity.
Data Origin Authentication
Verify source and integrity of message.
Non-repudiation
Create evidence that action has occurred, so user cannot falsely deny the action later.
2 Types of Attacks
1. Passive
2. Active
Active Attacks
- Goal is to modify, replicate of fabricate.
- Can detect and try to recover
e.g. phishing, DOS, Main-in-the-middle
Passive Attacks
- Goal is to obtain information
- Difficult to detect
e.g. eavesdropping, shoulder surfing.
3 Types of Countermeasures
1. Preventative controls
2. Detective controls
3. Corrective controls
Example of Preventative controls
Encryption of files
Example of Detective controls
Use checksum/MAC to detect data corruption.
Example of Corrective controls
Restore apps to last known good image to bring corrupted system back online.
What are the 3 sides of the Security Model? What is on each side?
1. Information States (top)
. Transmission
. Storage

, . Processing
2. Critical Information Security Services (left)
. Confidentiality
. Integrity
. Availability
3. Security Measures (right)
. Technology
. Policy & Practices
. Education, Training and Awareness
[1.2] What do researchers claim to be able to do to the Jeep Cherokee?
Take over the vehicle remotely, control entertainment system, climate control, driving
controls via wireless connection.
[1.2] Which information asset was targeted when researchers attacked Jeep
Cherokee?
Communications between the cellular network, the car, the entertainment system
software and the other control systems for the vehicle.
[1.2] Which of security goals are compromised if the attacks described in the
article are performed on a Jeep?
- Confidentiality: cellular network traffic reveals vulnerable vehicle, track GPS, trace
route over time, measure speed, monitor in car systems etc.
- Integrity: changes made to firmware to insert the code that allows for the remote
control.
- Availability: can take control away from authorised user.
[1.2] Data state of Jeep Cherokee?
Transmission (initially) of information related to Uconnect.
[1.2] How can you address the security problems of Jeep Cherokee example?
- Software patches to address the vulnerability
- During dev. implement a policy re: separate critical vehicle systems from
entertainment/phone systems.
- Education/training/awareness
[1.2] Were the Jeep Cherokee attacks active or passive?
Active attacks: constructed code and deliberately inserted it into system.
[1.3] Why is the continued use of Windows XP after April 2014 considered a
vulnerability?
- Software will no longer be patched = no repair of code errors.
- Flaws identified by criminals can be used to attack system.
[1.4] What is the full name of the organization known as AusCERT?
Australian Computer Emergency Response Team.
[1.4] One of the services provided by AusCERT is a Security Bulletins Service.
What sort of information assets do the Security Bulletins relate to?
Software. There are descriptions of vulnerabilities in particular software, sometimes
reports that these have been exploited 'in the wild', and some bulletins advise on control
measures available.
Threats
Set of circumstances with potential to cause harm to an information asset by
compromising stated information security goals.

Geschreven voor

Vak

Documentinformatie

Geüpload op
16 november 2024
Aantal pagina's
25
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TopGradeSolutions Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
95
Lid sinds
2 jaar
Aantal volgers
9
Documenten
13297
Laatst verkocht
5 dagen geleden
TOPGRADESOLUTIONS

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lees meer Lees minder
4.9

171 beoordelingen

5
159
4
7
3
4
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen