Assignment#1-1

Assignment#1-1 - MANAGEMENT OF INFORMATION SECURITY MISM...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
MANAGEMENT OF INFORMATION SECURITY MISM -661-001 5 1 PATEL KRUSHNAKANT FERRIS STATE UNIVERSITY SPRING 2010 ASSIGNEMENT #1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
MANAGEMENT OF INFORMATION SECURITY MISM -661-001 5 2 Chapter #1: Introduction to the Management of Information security Review Questions: Question # 4: What is the definition of security? How is a secure state usually achieved? Answer: The Security is defined as “the quality or state of being secure – to be free from danger.” The secure state can be achieved by means of several strategies usually undertaken singly or used in combination with one another such as identifying risks, measuring risks and mitigating risks at minimum level, by policy, awareness, training, education, and technology. Question # 7: What is the C.I.A triangle? Define each of its components parts. Answer: The C.I.A triangle is the basis of the CNSS model of information security, and an industry standard for computer security since the development of the mainframe. The C.I.A triangle founded on three desirable characteristics of information is confidentiality, integrity, and availability. Confidentiality: Confidentiality of information ensures that only those with sufficient privileges and a demonstrated need may access certain information. Integrity: Integrity is the quality or state being whole, complete, and uncorrupted. Availability: Availability is the characteristic of information that enables user access to information without interference or obstruction and in a useable format. Where, a user in this definition may be either a person or another computer system. Question# 9: Describe the CNSS security model. What are its three dimensions?
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/25/2010 for the course ISM MISM taught by Professor b during the Spring '10 term at Ferris State.

Page1 / 6

Assignment#1-1 - MANAGEMENT OF INFORMATION SECURITY MISM...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online