100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SEP2605 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 25 September 2025

Puntuación
-
Vendido
-
Páginas
13
Grado
A+
Subido en
22-09-2025
Escrito en
2025/2026

Question 1 Discuss and provide examples of the main differences between hacking and cracking. (8) Question 2 Cohen (1995:108-109) defines information as a symbolic representation in its most general sense. Protection is defined as keeping from harm. In the field of information protection, it refers to preventing harm to symbolic representations and the users of the information. Discuss the factors that are basic to information protection. (12) Question 3 Control rooms are at the heart of the security operation. Several issues and challenges are associated with designing a control room. Describe the challenges associated with designing a control room. (5) Question 4 Risk management is the process of assessing risk, taking steps to reduce risk to an acceptable level, and maintaining that level of risk (Blyth & Kovacich, 2006:47). Identify the five principles of risk management. (10) Question 5 A fire is a combustion process in which a fuel reacts with oxygen to give off heat and light. In an essay format, discuss how fires spread, apart from direct burning. (15)

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
22 de septiembre de 2025
Número de páginas
13
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SEP2605 Assignment 2
(COMPLETE ANSWERS)
Semester 2 2025 - DUE 25
September 2025

For assistance contact
Email:

, Information Security and Risk Management
Question 1: Hacking vs. Cracking
While the terms "hacking" and "cracking" are often used interchangeably by the general public,
they have distinct meanings in the field of cybersecurity, primarily differentiated by the intent
behind the action.
Hacking refers to the activity of exploring and manipulating computer systems and networks in
a non-malicious way. The motivation behind hacking is often curiosity, intellectual challenge, or
a desire to understand how a system works. Ethical hackers, also known as penetration testers,
are a prime example of this. They are hired by companies to intentionally hack into their
systems, with permission, to identify and report security vulnerabilities. Their goal is to improve
security, not to cause harm. For example, a penetration tester might try to exploit a weakness in a
web application's login system to demonstrate how an attacker could gain access, thereby
helping the company to fix the vulnerability before it is exploited maliciously.
Cracking, on the other hand, is a term used specifically for malicious hacking. A cracker's intent
is to break into a system to steal data, cause damage, or disrupt services. Their actions are illegal
and harmful. The objective is to exploit vulnerabilities for personal gain, revenge, or other
malicious purposes. Examples of cracking include a cybercriminal gaining unauthorized access
to a bank's database to steal customer credit card information, or a black-hat hacker creating and
distributing malware to disable a company's network.
In essence, the main difference between hacking and cracking is the intent. Hacking can be a
neutral or beneficial activity, while cracking is inherently malicious and illegal.
Question 2: Basic Factors in Information Protection
Cohen's definition of information as a symbolic representation and protection as keeping from
harm provides a foundation for understanding the core principles of information protection. The
fundamental factors basic to information protection are embodied in the CIA triad:
Confidentiality, Integrity, and Availability.
1. Confidentiality: This factor is concerned with keeping information private and
preventing its unauthorized disclosure. It ensures that data is accessible only to those with
the appropriate permissions. Techniques for achieving confidentiality include encryption,
access control lists (ACLs), and user authentication methods like strong passwords and
multi-factor authentication. An example would be a hospital safeguarding patient records
by encrypting them and restricting access only to authorized medical staff. Without
confidentiality, sensitive information could be leaked, leading to financial loss, legal
penalties, or a loss of public trust.
$2.50
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
gabrielmusyoka940 db
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1467
Miembro desde
2 año
Número de seguidores
247
Documentos
1488
Última venta
1 día hace
Bstudy

provides latest exam paper

3.2

216 reseñas

5
68
4
30
3
49
2
20
1
49

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes