Kingdom of Saudi Arabia Ministry of Higher Education Princess Noura bint Abdulrahman University College of Computer & Information Sciences IS 533 Name: ID: Section: Sheet #1 Q1- Describe the critical characteristics of information. How are they used in the study of computer security? Availability: Authorized users can access the information. Accuracy: free from errors. Authenticity: genuine. Confidentiality: preventing disclosure to unauthorized individuals. Integrity: whole and uncorrupted. Utility: has a value for some purpose. Possession: Ownership. Q2- Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study? Software, Hardware, Data, People, Procedures and Networks. All six of these components are impacted by the study of computer security. A flaw or an oversight in any one of the areas could lead to vulnerabilities or exposure. The components most associated with the study of information security are, when viewed as a science, hardware and software and when viewed as a social science, people. TA.Maha Al-kuaib & TA.Hussa Al-omran. Kingdom of Saudi Arabia Ministry of Higher Education Princess Noura bint Abdulrahman University College of Computer & Information Sciences IS 533 Q3- Who is ultimately responsible for the security of information in the organization? The Cheif Information Security Officer (CISO). Q4- Matching: Match each concept from column A to the definition belongs to in column B: A B 1- Access 3 Information is authentic when it is the information that was originally created, placed, stored, or transferred. 2- Accuracy 7 Enables users who need to access information to do 3- Authenticity 4 The quality or state of preventing disclosure or exposure to unauthorized individuals or systems. 4- Confidentiality 5 The quality or state of having value for some purpose or end. 5- Utility 1 The ability to use, manipulate, modify or affect an object. 6- Integrity 2 An attribute of information in which the data is free of errors and has the value that the user expects. 7- Availability 6 Ensures that the information is correct and no unauthorized person or malicious software has altered that data. TA.Maha Al-kuaib & TA.Hussa Al-omran.