solutions graded A+ updated
Hardware - correct answer ✔✔the physical parts of a computer e.g. monitor, CPU
Software - correct answer ✔✔Software is the set of instructions that tells the hardware what to
do e.g. excel
Personal Info Security - correct answer ✔✔Protecting your data by making strong passwords,
installing antivirus, backing up your data
Security Policies - correct answer ✔✔Guidelines for employees when using the company's
information resources.
Firewalls - correct answer ✔✔Hardware firewall is a device that is connected to the network
and filters the packets based on a set of rules.
A software firewall run on the operating systems and intercepts packets as they arrive to a
computer
Password Security - correct answer ✔✔The user name and the strong password should enable
the system to be secure.
Tools for Information Security - correct answer ✔✔1) Authentication: something the
know, " " they have, " " they
are.
, 2) Access control determines
which users are authorized to
read, modify, add/delete info.
3) Encryption is process of
encoding data upon its
transmission or storage so
only authorized individuals
can read it.
Info security triad CIA - correct answer ✔✔Confidentiality - ability to restrict access to only
those who are allowed to see it. Privacy
Integrity - assurance that the information being
accessed has not been altered and truly represents
what is intended. It can be both, intentional or
unintentional (accident).
Availability- information can be accessed and modified by anyone authorized to do so in an
appropriate time-frame.
data mining - correct answer ✔✔the process of finding patterns in a given data set. Used in
context of fraud detection.
data warehouse - correct answer ✔✔Provide generalized and consolidated data in
multidimensional view. Also supply online analytical processing (OLAP) tools. A data warehouse
helps business executives to organize, analyze and use their data for decision