100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

Information Security Exam 1 Spring 2024 – Panda Study Guide

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
21-11-2024
Written in
2024/2025

Information Security Exam 1 Spring 2024 – Panda Well Illustrated

Institution
INF4831 Information Security
Course
INF4831 Information Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
INF4831 Information Security
Course
INF4831 Information Security

Document information

Uploaded on
November 21, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Information Security Exam 1 Spring 2024 –
Panda
Security involves protection from ___ and ___ - Read violations, write (modification)
violations

Security - Securing both the computer and the network

Insider Threat - Can happen when only focused on securing the network aspect and not
the computer aspect.
Threat comes from inside the organization (same network).
Both 1) causes more damage and 2) harder to detect than Outsider Threat due to
privileges/greater access to system.

Outsider Threat - Threat comes from outside the organization (different network).

Social Engineering - Tricking people into disclosing information instead of hacking
hardware

Social Engineering Methods - Showing superiority (me smart, you dumb) or inferiority
(help me plz idk anything).
Phishing (clik dis link).

WWW - World Wide Web.
Document management system of connected hyperlinks.

Internet - Connects computers.

Vulnerability - A weakness in the system that can be exploited by a threat.

Risk - Possibility of the assets suffering damage.
Risk requires all of the following to be present: Vulnerability, Asset, Threat.

Of Vulnerability, Threat, and Asset, which of them can be minimized most
effectively/commonly so that Risk may be reduced? - Vulnerability

CIA Paradigm - Confidentiality (Read protection from UNauthorized users)

Integrity (Write protection from UNauthorized users)

Availability (legit users must be able to use the data as needed without being overly
burdened by safety measures)
- E.g., a vault with no key to maximize security

, How to measure availability? - 1) System Uptime
2) System Downtime
3) % Uptime (Uptime divided by TotalTime)

4) Mean (average) time to repair
- Low value is good. E.g., 1hr to repair per month
5) Mean (average) time to failure
- High value is good. Time it takes from system starting to system failing

Security Paradigm - Protect (e.g., firewall)

Detect (e.g., antivirus scan, honeypots, log files)

Recover/React (e.g., use backups)
- Must be fast (bc availability) and correct (bc integrity)

A chain is as strong as ___ - Its weakest link

What are the seven IT domains? - 1) User
2) Workstation (something that a user can use to login)
3) LAN (Local Area Network)
4) LAN-to-WAN
5) WAN (Wide Area Network)
6) (Main) System/Application (e.g., Google app)
7) Remote Access

What is the most insecure part of a system? - Users (humans)

What two terms are used when developing and implementing a set of rules for an entire
IT system?
Security ___ and Security ___ - Security Policies, Security Mechanisms

Security Policies - Set of statements that can be implemented to enforce security.
What we want done.
E.g., Prevent harmful URLs from being accessed on the server.

Security Mechanisms - Define how policies can be implemented.
How we want security done.
E.g., Don't allow xyz.com to be accessed on the server.

Secure State - State in which a system cannot have any security violations

What are the three states of a system, in reference to the Secure State? - Broad: An
insecure system state may be reached
R148,32
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
spikerocky

Get to know the seller

Seller avatar
spikerocky Rhodes university
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
1
Documents
29
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions