CSS 111 - Introduction to Information System
Review for First Test
The following questions are provided to help you study for
the first test. Do not expect to see these exact questions on the test.
are specialized areas of security that are listed in chapter 1? What
are some of the things a specialist in each area should be concerned
- What is the meaning of the acronym CIA with regard to information security?
- What is the difference between identification and authentication? Can you do one without the other?
- What do the three axes on the McCumber cube represent?
- What are the three concerns of IT Security staff, according to McCumber?
- What are the three IT security concerns of IT Operations staff, according to McCumber?
- What are the three IT security concerns of Enterprise Business staff, according to McCumber?
- Explain the difference between a threat and a threat agent.
- A category of threats listed in the text is human error. Why is
this considered a threat, when errors are not intentional?
- What is a security incident? How might it lead to a disaster?
- What is risk, with regard to IT assets? How does vulnerability relate to risks?
- What is an exploit?
- What are examples of controls and safeguards?
- In the SDLC discussion, why is the model shown in the text called a waterfall model?
- Why does IT security need to protect the functions of an organization? Why does it need to protect an organizations software and data?
- What is the difference between a virus and a worm?
- What is a Denial of Service attack?
- What are two ways that employees can be security risks?
- What are phishing attacks?
- How does social engineering help an attacker prepare for an attack?
- What are the differences between laws, ethics, and morals?
- Why should we try to achieve full distribution of security policies?
- How does it help a company to make a security policy available to staff at an online web page?
- Why should a company apply its policies uniformly to all staff?
- Some policies have sunset clauses or provisions in the, because they are not meant to last forever. What would be an example of a policy that should have a known end date?
- What would be the argument a lawyer would make against a policy that was not applied equally to all staff?
- Name at least three things a person should do if they experience an identity theft, according to the Federal Trade Commission.
- What is a catalog of assets, and how does it help us in IT security?
- What are some ways we might choose to prioritize assets? Name at least three.
- Must we protect all of our assets from all of the threat categories listed in the text?
- Which federal law established that wiretaps need to be authorized by a court issued warrant?
- Which law gave the FBI the power to ask for data about subscribers to electronic services without a warrant?
- Which law makes it a crime to share health related information with people other than the patient without the patient's permission?
- Which law made it possible to request information from federal agencies? What costs are involved that a requester should be aware of?
- In the formula Risk = (V * L) -(V * M) + U, what is the meaning of each letter? How might we determine a value for each of those letters?
- What does a company do if it is adopting the risk avoidance strategy? How is this different from the risk termination strategy?
- What does it mean to adopt transference of your risks?
- What is the risk mitigation strategy?
- Why would a company decide to use risk acceptance?
- What is single loss expectancy? Why might it not be the same number as annualized loss expectancy for a particular risk?
- What is the annualized cost of a safeguard? How does this relate to cost benefit analysis?
- What is baselining? What is the risk of not performing a baselining study?
- The text tells us policies may come in three types: enterprise policies, issue specific policies, and system specific policies. What is the difference between them?
- The text discusses the importance of choosing a good security model. What are the three models discussed in class? Where can you get more information about each of them?
- Explain how the words blueprint, framework, and model relate to a project that develops a security plan for your organization?
- Defense in depth is not a specific recommendation for a security plan. What does it mean to the person making the plan?
- Even though the term is not a good metaphor, what is a DMZ with regard to your network and security?
- How are the functions of a firewall and a proxy server similar and different?
- Why do we train general employees in security matters, and provide them with security awareness reminders?
- Consider Amy and the sudden problems she had on the help desk in chapter 1. What mitigation plan should have applied to her first phone call?
- Assuming the company's problem in the last question is still continuing, what mitigation plan should apply to keeping the company running at the same time?
- Once the worm is removed from all systems, which mitigation plan should be used if the company chose to operate briefly from another location?