Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Session 1 Define the security objectives/TRIAD. When are you considered secured?

ID: 3598601 • Letter: S

Question

Session 1

Define the security objectives/TRIAD. When are you considered secured?

Answer:


Define the difference between least privilege and separation of duties.

Answer:


Which category of security control deals with education?

Answer:

Terms such as availability, protection, and privacy are frequently used in discussing information-storing systems. (True/False)

Answer:

According to Session 1 materials what are five examples of security techniques applied to computer systems?
Answers:
Under the Bush administration, the Department of State developed national policies to deal with risks to the critical information infrastructure. (True/False)

Answer:

Session 2

What is the framework COBIT, its strengths, and focus?

Answer:


In computer crime investigations you need to maintain integrity of data so you can establish that it wasn’t changed at any point in time. You can use things like write blockers and hashing techniques. (True/False)

Answer:  

In Session 2 what are the terms that relate to BCP? Please describe each.
Answer:

______________ is the official management decision given by a senior agency official to authorize operation of an information system and to accept the risk to agency operations based on the implementation of an agreed-upon set of security controls.

Answer:

According to Session 2 materials please define the steps in a detailed or formal risk analysis.
Answer:

What is another name for the U.S. Department of Defense Trusted Computer System Evaluation Criteria (TCSEC)?

Answer:

Which of the following models does a Microsoft Window server utilize?
Brewer and Nash Model
Take-Grant Model
Graham Denning Model
Lattice Model

Answer:
Which architecture identifies components and their associated functionality and describes connectivity of components.
Technical
Enterprise
Security
Framework
Answer:
What is the "Common Criteria," and how is it applied?

Answer:
Session 4

Stephen and Nancy are both users of (PKI). Explain how they use their keys to communicate when Stephen sends a private message to Nancy, and provides proof that Stephen sent the message.

Answer:  
____________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

Answer:  

According to Session 4 material what are the five primary functions of cryptography?

Answer:

Convert the cipher text Aqw fgugtxg cp C kp vjku encuu to English. Describe the steps you performed to get the answer. What is the offset/key?

Answer:

RC4 is perhaps the most used stream cypher including in products supporting Secure Socket (SSL) and Secure Electronic Transaction. (True/False)

Answer:

Session 5

_______________ is the traditional method of implementing access control.

MAC B. RBAC

DAC D. MBAC

Answer:

What are the three general means for authenticating a user’s identity? Also give examples.

Answer:

Compare and contrast Access Control List (ACLs) and Capability List.

Answer:

What is multi-factor authentication? Why does it provide better protection?

Answer:

What is Hash Guessing? What utility did you learn in your reading that you could use?

Answer:

Explanation / Answer

Session 1:-

1. The most important security objectives are Confidentiality, Intigrity and Availability. These are the main objectives which intigrity means securing from unauthorised access and modifications to the data , and the confidentiality means preserving the data from unauthorised access and disclosure. Availability means always maitain the data accessible to reliable sources.

Whenever we apply these objectives effectively to the data we can consider the data and information is secured.

2. Least privilege means giving the least possible access to the person according to their job role.

Seperation of Duties means giving the privileges according to the job roles i.e.for ex Manager has access to total branch cash information, but the clerks in that bank only known to their individual amount at desk only they are not allowed to know the information about the total branch liabilities.

3. Detective security control category deals with education.

4. True. Because these are the terms which is used while securing the information

5. ( As I dont know that materials you can find that by referring those materials )
6. True

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote