Urgent help needed with these questions related information

Urgent help needed with these questions related information security ! :)

6. Identify some typical information assets.
7. Describe the three security properties of information (hint: “CIA”).
8. What are the different levels of motivation with which we assess thread agents?
9. Describe the six general types of attacks on information. Which are passive attacks and
which are active attacks
10. Give examples of how individuals can act as vulnerabilities, defenses, or threats to an
information system
11. Write a summary of how computers are used at CAU?
12. Draw a diagram of the physical security boundary around our class at room 1010.
Identify possible points of entry. Describe how the physical boundary is kept secure if no
one is present.
13. Make a list of the really important tasks performed by your personal computer. If you
do not own your own computer, describe one that you regularly use for class work. List
the physical and information assets you rely upon to perform these tasks.
14. Write the first part of a security plan for your own cybersecurity assets or another small
set of assets. The plan includes the following:
- A list of security asset risks.
- A list of security requirements for your assets

Solution

6. An information asset is a well organised and managed collection of knowledge and facts that are stored as a single unit. This collection is called as an asset because it holds financial value depending on the type of information it is storing.Almost every orgainsation has an information asset. The value of the assest depends on how useful the asset is to the people of the organisation which in turn depends on how well organised the data is stored in the information asset . Given below are some of the examples of information assets:

7. The three security properties of information are confidentiality, integrity and avalaibility.

Confidentiality: Confidentiality means keeping the information secure from miscreants.Today immense amount of information is being circulated and stored in an organisation like bank account details,credit card numbers,social security numbers,official documents etc.All thid valuable information ha sto protected from being hacked or tampered. One such security that can maintain the confidentiality of the information is encryption.Encryption ensures that the information is being read ony by the intended receipeint and not by any micreant.

Integrity: maintaining the integrity of the infromation means protecting the information from being tampered. Tampering with the information can prove fatal for any organisation. Integrity of the information means that the information reaches the receiver exactly in the way it has been sent by the sender. There many ways like using Crptography ash functions that tells the reciever that whether the informartion recieved by him has been tampered or not.

Avalaibility: Avalability means that the user should be able to access the information as and when needed. The information is of value inly when the user can access the information when needed. These many attacks on the database take place which restricts the user from accessing the database.The solution of this is to create backup of the database periodically.


Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site