100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
06-11-2025
Written in
2025/2026

CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Midterm Exam Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers

Show more Read less
Institution
CSE 4471
Course
CSE 4471










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSE 4471
Course
CSE 4471

Document information

Uploaded on
November 6, 2025
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

11/6/25, 8:23 PM CSE 4471 Midterm|



Science Computer Science Computer Security and Reliability



CSE 4471 Midterm Exam Information Security, Ohio
State University-Main Campus \complete questions
and correct detailed answers \verified answers


software, hardware, data, people, procedures, and
Information System
Components networks necessary to use information as a resource
in the organization
Security The quality or state of being secure -- to be free from danger
Security Layers Physical, personal, operations, communications, network,
information
(Investigation)
Determine goals of security project scope and define project
Evolution determine organizational feasibility
enumerate specific threat impacts analyze potential legal issues
Analyze risk evaluation and management
business continuity plan incident response plan disaster recovery
plan
implementation plan component selection success criteria
Design
build/buy components integrate
Implementation educate user community
evaluate daily-use tools feed-back from users
simulated business disruption simulated natural disaster
Testing measure results vs success criteria




/ 1/1
6

,11/6/25, 8:23 PM CSE 4471 Midterm|



The protection of information and its critical elements,
Information Security
including systems that use, store, and transmit that
information.
CIA Confidentiality, Integrity, and Availability
IS Tools policy, awareness, training, and technology
Security should be a balance protection and availability
between ____ and ____.
x(Confidentiality, Integrity, Availability) z(Policy,
CNSS Model (McCumber
Cube) Education, Technology) y(Storage, Processing,
Transmission)
accuracy describes how free of errors the data is
authenticity describes how genuine the data is
availability describes how accessible the data is
confidentiality describes how data is protected from unauthorized access
integrity describes the completeness and consistency of the data
possession describes the legitimacy of the data's ownership
utility describes the value or usefulness of the data
Rand Report R-609 IS was conceptually defined by this paper, started computer
security
access the ability to interact with a resource, legitimately or otherwise
asset a specific resource of value
attack an act, intentional or not, that may damage an asset
countermeasure a specific mechanism or policy intended to improve security
exploit a technique used to compromise an information system
loss an instance of an information asset suffering damage
threat an object, person, or other entity which represents a danger to
assets
threat agent a person or system who uses exploits to instantiate threats
vulnerability a system weakness or fault which decreases security
discretionary access
control individual
authentication
C-2 Security
object
reuse
audit
trails
resource

/ 2/1
6

, 11/6/25, 8:23 PM CSE 4471 Midterm|

isolation
private files




must be possible to grant/deny access to specific
discretionary access control
resources to named users or groups of users
individual authentication user must identify themselves in a unique manner
object reuse memory and disk must not be readable after delete
audit-able actions must associate with user, access to
audit trails
audit data must be limited to admins
systems protected from external modification of running
resource isolation
operating system or stored system files
security-related events accessible only by systems
private files
admin but sys admin cannot read other users files
Security Development Life- evolution->analyze->design->implementation->testing
cycle (SDLC)




/ 3/1
6

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSEGENERAL Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
69
Member since
1 year
Number of followers
3
Documents
7635
Last sold
1 week ago
Homeland bookshop

It is a modern bookshop that provide accurate documents such as revision papers ,exams , notes , essays , summaries , flashcards and other study materials. Discover any material you want on my site and feel free to contact me at my email WELCOME ALL !!!! WELCOME ALL!!

4.5

10 reviews

5
6
4
3
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions