Question 1. 1. (TCO A) What does it mean to say that
information assets are critical business assets? (Points : 5)
Spellchecker
Question 2. 2. (TCO B) Explain why the term due care is very
rarely used in policy documents. (Points : 5)
Spellchecker
Question 3. 3. (TCO C) What are the vulnerabilities that (1)
confidentiality controls, (2) integrity, controls, and (3) availability
controls protect information assets against? (Points : 5)
Spellchecker
Question 4. 4. (TCO F) Describe the idea of reuse in the
computer systems life cycle. (Points : 5)
Spellchecker
Below 4
1. (TCO A) Reuse is a term that is commonly used to mean
that things do not need to be developed each time that they are needed, but
rather can be used over and over without redevelopment. Reuse is common in the
software and hardware industries. However, one must be careful with reuse. What
is a pitfall of the strategy of reuse? (Points : 15)
Spellchecker
Question 2. 2. (TCO B) Controlled Unclassified Information
is a term invented by the President of the United States in 2008. This new
category of information replaces about 150 (or more) existing categories of information
and eliminates those over a five-year period. Controlled Unclassified
Information is intended to include all of the unclassified information
currently addressed by SOX, HIPAA, FERPA, FISMA, GLB, and so forth. When this
effort is completed, there will be exactly three categories of Controlled
Unclassified Information, which will replace all 150 (or more) current
information categories. What is the advantage of reducing the number of
categories of unclassified information from the estimated 150 to three? (Points
: 15)
Spellchecker
Question 3. 3. (TCO C) Today, several security services are
increasingly provided as common security services. These include audit and
monitoring services, authentication services, access management services, directory
services, and a variety of detection, prevention, and mitigation services. What
is meant by "common security services" and what advantage and
disadvantage do they provide when compared to commodity security controls?
(Points : 15)
Spellchecker
Question 4. 4. (TCO F) Explain why human errors are
considered a threat to computer security. (Points : 15)
Spellchecker
Solution: sec578 midterm exam 2017 march