Home work | Information Systems homework help
Home work | Information Systems homework help.
1. The Minimum Security Requirements for Federal Information and Information Systems standard enumerates 19 security-related areas for protecting information. TRUE/FALSE
Answer:
2. FIPS 200 specifies minimum security requirements for federal home land support information and information systems and a risk-based process for selecting the security controls necessary to satisfy the minimum requirements. TRUE/FALSE
Answer:
3. What are the three categories that security specialists have found useful for identifying potential security violations?
Answer:
4. Define what the Functional Levels of Information Protection are.
Answer:
Session 2
5. Define what a security policy is and list the required elements.
Answer:
6. What are the approaches to risk management?
Answer:
7. In Session 2 how does one quantify risk?
Answer:
8. What are the minimum security requirements for Federal Information Processing Standard (FIPS) 200?
Answer:
9. According to Session 2 materials please define the steps in a detailed or formal risk analysis.
Session 3
10. What is the difference between technical architecture and security architecture?
Answer:
11. Information or security assurance is the degree of confidence one has that the security controls operate correctly and protect the system as intended. TRUE/FALSE
Answer:
12. What are security models, and why are they useful?
Answer:
Session 4
13. Describe the three basic types of algorithms or techniques used in cryptography. According to your course material.
Answer:
14. Describe DES and how it is used.
Answer:
15. What is the difference between digital signature and digital envelope?
Answer:
16. Convert the cipher text Aqw fgugtxg cp C kp vjku encuu to English. Describe the steps you performed to get the answer. What is the offset/key?
Session 5
17. Why biometrics system are not still widely used?
Answer:
18. What are the categories and classifications of access controls?
Answer:
19. How can access control categories can be combined?
Answer: Open Answer
20. Compare and contrast Access Control List (ACLs) and Capability List.
Answer:
1. The Minimum Security Requirements for Federal Information and Information Systems standard enumerates 19 security-related areas for protecting information. TRUE/FALSE
Answer:
2. FIPS 200 specifies minimum security requirements for federal home land support information and information systems and a risk-based process for selecting the security controls necessary to satisfy the minimum requirements. TRUE/FALSE
Answer:
3. What are the three categories that security specialists have found useful for identifying potential security violations?
Answer:
4. Define what the Functional Levels of Information Protection are.
Answer:
Session 2
5. Define what a security policy is and list the required elements.
Answer:
6. What are the approaches to risk management?
Answer:
7. In Session 2 how does one quantify risk?
Answer:
8. What are the minimum security requirements for Federal Information Processing Standard (FIPS) 200?
Answer:
9. According to Session 2 materials please define the steps in a detailed or formal risk analysis.
Session 3
10. What is the difference between technical architecture and security architecture?
Answer:
11. Information or security assurance is the degree of confidence one has that the security controls operate correctly and protect the system as intended. TRUE/FALSE
Answer:
12. What are security models, and why are they useful?
Answer:
Session 4
13. Describe the three basic types of algorithms or techniques used in cryptography. According to your course material.
Answer:
14. Describe DES and how it is used.
Answer:
15. What is the difference between digital signature and digital envelope?
Answer:
16. Convert the cipher text Aqw fgugtxg cp C kp vjku encuu to English. Describe the steps you performed to get the answer. What is the offset/key?
Session 5
17. Why biometrics system are not still widely used?
Answer:
18. What are the categories and classifications of access controls?
Answer:
19. How can access control categories can be combined?
Answer: Open Answer
20. Compare and contrast Access Control List (ACLs) and Capability List.
Answer: