week13 ITC482 REVISION_2

Assets 18 9 what is the octave method what does it

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ets. assets. 18 9 What is the OCTAVE Method? What does it provide to those What who adopt it? who Answer: The OCTAVE Method is an InfoSec risk evaluation Answer: InfoSec risk methodology that allows organizations to balance the protection of critical information assets against the costs of providing protection of critical information assets against the costs of providing protective and detective controls. controls. Phase 1: Build Asset Based Threat Profile Asset list and current protection mechnisms Asset mechnisms Phase 2: Identify Infrastructure Vulnerabilities Key IT components are examined for vulnerabilities that Key could lead to unauthorised access. unauthorised Phase 3: Develop Security Stratergy and Plans Phase Stratergy Risk are analysed, iimpact, and costs to protect, then a list of Risk analysed mpact, highest priority is made. highest 19 What is the most widely accepted What biometric authorization technology? Why do you think this is the case? this Answer: Photo identification cards Answer: read by human guards or gatekeepers. It is low-cost and gatekeepers. cost highly reliable. highly 20 10 What is the most effective biometric What authorization technology? Why do you think this is the case? you Answer: Iris scanning. It is very Answer: accurate, highly repeatable and moderately unobtrusive. moderately *also can be expensive to implment *also implment 21 What is a DMZ? Is this really a good What name for the function that this type of subnet performs? subnet Answer: A demilitarized zone (DMZ) is Answer: an intermediate area between a trusted network and an untrusted untrusted network. It is a fitting name since network. traffic coming into this area can not directly access its destination; making this a security feature by limiting access and potential flaws. limiting 22 11 How does a network-based IDS differ from a based host-based IDS? host Answer: A network-based IDS monitor’s network traffic in order to provide early warning to potential network threats (such a DOS attacks). A host-based IDS is setup DOS based to monitor the access or altering of files on multiple systems. The host-based IDS are multiple based much easier to set up and administer than the network-based IDS due to the more the based specific rules and restrictions that can be set. set. 23 What special function does a cache server What perform? Why does this function have value for larger organizations? value Answer: Answer: A cache server stores the Answer: most recently accessed pages in an internal cache. This is beneficial to large companies since it can cut down on load and access times due to the pages being stored on a more local basis, therefore eliminating constant access to the outside improving load times and security. improving 24 12 What is a VPN? Why a...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online