Each information asset the standard it system

Info icon This preview shows pages 2–3. Sign up to view the full content.

View Full Document Right Arrow Icon
each information asset The standard IT system components include: people, data, networks, hardware, software, and ____________________. procedures As each information asset is identified, categorized, and ____, a relative value must also be assigned to it. classified To make the process of analyzing threats less daunting, steps in the threat and vulnerability identification processes should be handled jointly. False Almost every organization is aware of its image in the local, national, and international spheres. Loss or ____ of some assets would prove especially embarrassing. ... Which of the following activities is part of the risk assessment process? Calculating the risks to which assets are exposed in their current setting The ____ is also referred to as an electronic serial number. MAC address Classification categories must be ____ (all inventoried assets fit into a category) and ____ (each asset is found in only one category). comprehensive, mutually exclusive The relative value of an information asset depends on how much ____ it generates—or, in the case of a nonprofit organization, how critical it is to service delivery. revenue Assessing risks includes assigning a value to each information asset. False People are divided into insiders (employees) and outsiders (nonemployees). Outsiders come in two categories: either they hold trusted roles and have correspondingly greater authority and accountability, or they are regular staff without any special privileges. False Likelihood is the overall rating of the probability that a specific vulnerability will be exploited. True In a TVA worksheet, along one asset lies the prioritized set of ____, along the other the prioritized set of ____. assets, threats Piracy and copyright infringement are examples of the threat of compromise to ____________________ property. intellectual
Image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern