89 you can assess the relative risk for each of the

This preview shows page 5 - 9 out of 12 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
MIS
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 6
MIS
Bidgoli
Expert Verified
89.You can assess the relative risk for each of the vulnerabilities by a process called risk ____________________.90.____________________ is the probability that a specific vulnerability within an organization will be success-fully attacked.
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
MIS
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 6
MIS
Bidgoli
Expert Verified
91.Security ____________________ are the technical implementations of the policies defined by the organiza-tion.92.A(n) ____________________ control specifically addresses admission of a user into a trusted area of the or-ganization.93.____________________ access controls are implemented at the discretion or option of the data user.94.____________________ is the risk control strategy that attempts to prevent the exploitation of the vulnerabil-ity.95.____________________ is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.96.Of the three types of mitigation plans, the ____________________ plan is the most strategic and long term.97.Cost ____________________ is the process of avoiding the financial impact of an incident by implementing a control.98.Asset ____________________ is the process of assigning financial value or worth to each information asset.99.A single loss ____________________ is the calculation of the value associated with the most likely loss from an attack.100.____________________ is the process of seeking out and studying the practices used in other organizations that produce results you would like to duplicate in your organization.101.The difference between an organization’s measures and those of others is often referred to as a performance ____________________.102.Due ____________________ is the demonstration that the organization is diligent in ensuring that the imple-mented standards continue to provide the required level of protection.103.A(n) ____________________ is a “value or profile of a performance metric against which changes in the per-formance metric can be usefully compared.”104.Operational ____________________ addresses user acceptance and support, management acceptance and support, and the overall requirements of the organization’s stakeholders.105.Behavioral feasibility is also known as ____________________.Essay106.Describe five new subdivisions of information system components of SecSDLC/risk management.107.Describe several different types of access controls.
108.List seven key areas identified by Microsoft as best security practices for home users.04Answer SectionTRUE/FALSE1.ANS: T2.ANS: F3.ANS: F4.ANS: F5.ANS: T6.ANS: F7.ANS: T8.ANS: T9.ANS: F10.ANS: F11.ANS: F12.ANS: F13.ANS: T14.ANS: F15.ANS: T16.ANS: F17.ANS: F18.ANS: F19.ANS: T20.ANS: F21.ANS: F22.ANS: T23.ANS: T24.ANS: T25.ANS: T26.ANS: T27.ANS: T28.ANS: F29.ANS: F30.ANS: T31.ANS:F, identification32.ANS: T33.ANS:F, Comprehensive
PTS:1REF:116
PTS:1REF:118
PTS:1REF:119
PTS:1REF:122
PTS:1REF:122
PTS:1REF:124
PTS:1REF:124
PTS:1REF:130
PTS:1REF:134
PTS:1REF:141
PTS:1REF:142
PTS:1REF:142
PTS:1REF:163
PTS:1REF:162
PTS:1REF:161
PTS:1REF:159
PTS:1REF:159
PTS:1REF:157
PTS:1REF:156
PTS:1REF:155
PTS:1REF:151
PTS:1REF:151
PTS:1REF:125
PTS:1REF:127-128
PTS:1REF:150
PTS:1REF:147
PTS:1REF:149
PTS:1REF:149
PTS:1REF:145
PTS:1REF:151-152MODIFIED TRUE/FALSE
PTS:1REF:117
PTS:1REF:116
PTS:1REF:124
34.ANS: T35.ANS:F, assessment36.ANS:F, assessment37.ANS:F, Residual38.ANS: T39.ANS:F, lattice40.ANS: T41.ANS: T
PTS:1REF:126
PTS:1REF:134
PTS:1REF:139
PTS:1REF:141
PTS:1REF:141
PTS:1REF:142
PTS:1REF:147
PTS:1

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture