click below
click below
Normal Size Small Size show me how
CYB1100-UI CH1 Pre
Foundations of Information Security _ Jason Andress WHAT IS INFORMATION SECURITY
| Question | Answer |
|---|---|
| What are the pros of technology | allows us to access a host of information with only a click of the mouse |
| What are the cons of technology | poses major security risk, If the information on the systems used becomes exposed to an attacker, the consequences could be dire indeed. |
| what is an example of a security risk relating to the use of technology and an employee firm and the resulting fall out from that incident (highlighting why information security is important and relevant) | find contents of account transferred 2 bank n another country n night.employer lose millions of $,face legal prosecution,suffer damage to reputation because of system config issue:allowed attacker 2 gain access 2 database containing (PII)/proprietary info |
| PII | personally identifiable information |
| why were security breaches nearly non-existent previously | largely because the technology was at a relatively low level and few people were using it |
| gaining a good understanding of the basics of information security will give you an advantage on | having a strong footing to cope with changes as they come. |
| Although technology changes at an increasingly rapid rate, much of the theory about keeping ourselves secure can be described as | lagging behind |
| some of the basic concepts of information security | security models, attacks, threats, vulnerabilities, and risks. |
| complex concepts of information security | risk management, incident response, and defense in depth. |