Chapter8

Piracy and copyright infringement are examples of the

Info iconThis preview shows pages 2–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Piracy and copyright infringement are examples of the threat of compromise to ____________________ property. intellectual The process of assigning relative values to information assets helps to ensure that assets with higher values are protected first. True A(n) ____________________ defense is the foundation of any information security program. layered Knowing the enemy means that the threats facing an organization's information assets should be identified, examined, and ____________________. understood Risk management is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be controlled Which of the following is the final step in the risk identification process of information assets? Listing by order of importance ____ elements are divided into three categories: applications, operating systems, or security components. Software
Background image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A TVA spreadsheet combines prioritized lists of assets and threats to identify vulnerabilities and provide a prioritized list of efforts relating to the implementation of needed controls. True One of the calculations that guides corporate spending on controls is the cost of ____ operations if an attack occurs and is successful. recovery During risk identification, managers identify the organization's information assets, classify and categorize them into useful groups, and prioritize them by their overall importance. True A ranked vulnerability risk worksheet assigns a ranked value or impact weight to each information asset. False Risk is the likelihood of the occurrence of a(n) ____ multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability. vulnerability
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page2 / 3

Piracy and copyright infringement are examples of the...

This preview shows document pages 2 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online