A+ GRADED. Buy Quality Materials!
Enterprise computer security today has become easier than it was in 1990
because computers are faster and more powerful now
false
20 years ago, hacking was done equally by both experts and amateurs. However,
because computer systems are much more complicated today, at the present
time amateur hackers are no longer a threat to enterprise information technology
systems
false
in information security, the term "confidentiality" ensures that the necessary level
of secrecy is enforced at each junction of data processing and prevents
unauthorized disclosure
true
in information security, the term "integrity" means ensuring that senior
management uses computer systems only for ethical reasons, in compliance with
the corporate information technology Acceptable Use Policy (AUP)
false
in information security, the term availability means that systems and networks
should provide adequate capacity to perform in a predictable manner, with an
acceptable level of performance
true
security through obscurity is one of preferred industry standards, which is
almost always used to address vulnerabilities in the LINUX and UNIX operating
environments
false
The IT Risk Assessment model we studied in class is comprised of the following
six steps:
false
An optional component of a standard corporate security policy is the
documentation of how enforcement should be carried out
false
security policies should be written in such a way to allow, permit and strongly
encourage policy interpretation by employees throughout the corporation
false
"due diligence" is defined as the act of investigating and understanding the risks
a company faces, and "due care" is a statement which demonstrates that the
company has accepted and taken responsibility for activities which take place in
the organization
true
trade secrets, specialized custom software code, and information which is
necessary to give a company an important competitive edge would more likely to
be classified as "Confidential" than "Private"