click below
click below
Normal Size Small Size show me how
CYB1100-UI CH1.2
Foundations of Information Security_ When are you secure ?
| Question | Answer |
|---|---|
| What did Eugene Spafford say in regards to a truly secure computer system. | The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards—and even then, I have my doubts |
| Describe the state of a truly secure system ( one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards) and it's use | A system in such a state might be secure, but it’s not usable or productive. |
| In general what happens when you increase the level of security for a system | you usually decrease the level of productivity. |
| What must be considered when securing an asset, system, or environment | consider how the level of security relates to the value of the item being secured |
| If you’re willing to accommodate the ______ in performance, you can apply ___________ levels of security to every asset for which you’re responsible | decrease, very high |
| what should never outstrip the value of what it’s protecting | The cost of the security you put in place |
| In any environment where you plan to put heightened levels of security in place what do you need to consider | need to consider the cost of replacing your assets if you happen to lose them and make sure you establish reasonable levels of protection for their value |
| why is defining the exact point at which you can be considered secure a challenge | Are you secure if your systems are properly patched? Are you secure if you use strong passwords? Are you secure if you’re disconnected from the internet entirely? ANSWER: No No single activity or action will make you secure in every situation. |
| _________________ will make you secure in every situation. | No single activity or action will make you secure in every situation. |
| why is it that no single activity or action will make you secure in every situation? | Even if ur systems are properly patched, will always b new attacks to which ur vulnerable. When ur using strong passwords,attacker will exploit different avenue When ur disconnected from internet an attacker could still physically access/steal ur system |
| what is a much easier task than defining when you’re truly secure | defining when you’re insecure |
| what are several examples that would put you in an insecure state | Not applying security patches or application updates to your systems Using weak passwords such as “password” or “1234” Downloading programs from the internet Opening email attachments from unknown senders Using wireless networks without encryption |
| why is being able to point out the areas in an environment that can make it insecure important | you can take steps to mitigate these issues |
| Although you may never get to a state that you can definitively call “secure,” you can | take steps in the right direction. |