ModelAnswerSheet#1

advertisement
Kingdom of Saudi Arabia
Ministry of Higher Education
Princess Noura bint Abdulrahman University
College of Computer & Information Sciences
IS 533
Name:
ID:
Section:
Sheet #1
Q1- Describe the critical characteristics of information. How are they used in
the study of computer security?
Availability: Authorized users can access the information.
Accuracy: free from errors.
Authenticity: genuine.
Confidentiality: preventing disclosure to unauthorized individuals.
Integrity: whole and uncorrupted.
Utility: has a value for some purpose.
Possession: Ownership.
Q2- Identify the six components of an information system. Which are most
directly affected by the study of computer security? Which are most commonly
associated with its study?
Software, Hardware, Data, People, Procedures and Networks.
All six of these components are impacted by the study of computer security. A flaw
or an oversight in any one of the areas could lead to vulnerabilities or exposure. The
components most associated with the study of information security are, when
viewed as a science, hardware and software and when viewed as a social science,
people.
TA.Maha Al-kuaib & TA.Hussa Al-omran.
Kingdom of Saudi Arabia
Ministry of Higher Education
Princess Noura bint Abdulrahman University
College of Computer & Information Sciences
IS 533
Q3- Who is ultimately responsible for the security of information in the
organization?
The Cheif Information Security Officer (CISO).
Q4- Matching:
Match each concept from column A to the definition belongs to in column B:
A
B
1- Access
3
Information is authentic when it is the information
that was originally created, placed, stored, or
transferred.
2- Accuracy
7
Enables users who need to access information to do
3- Authenticity
4
The quality or state of preventing disclosure or
exposure to unauthorized individuals or systems.
4- Confidentiality
5
The quality or state of having value for some
purpose or end.
5- Utility
1
The ability to use, manipulate, modify or affect an
object.
6- Integrity
2
An attribute of information in which the data is free
of errors and has the value that the user expects.
7- Availability
6
Ensures that the information is correct and no
unauthorized person or malicious software has
altered that data.
TA.Maha Al-kuaib & TA.Hussa Al-omran.
Download