140k views
3 votes
1. what are six examples of information technologies that could be used in computer crimes. 2. what is the cia triangle? 3. what are three most common security threats? 4. what are three most common security measures? 5. what are 10 guidelines that should be included in a comprehensive security system? 6. explain business continuity planning. 7. what are five examples of biometric security measures? 8. define zero trust security. what are three of its principles?

1 Answer

2 votes

Answer:

1. Six examples of information technologies that could be used in computer crimes are:

a. Malware: Software designed to damage or gain unauthorized access to computer systems.

b. Phishing: Deceptive emails or websites to trick users into revealing sensitive information.

c. DDoS (Distributed Denial of Service) Attacks: Overloading a network or website to disrupt its services.

d. Ransomware: Encrypting a victim's data and demanding a ransom for its release.

e. Social Engineering: Manipulating individuals into revealing confidential information.

f. Insider Threats: Malicious actions or data breaches by individuals within an organization.

2. The CIA triangle in information security stands for:

- Confidentiality: Ensuring that information is only accessible to authorized individuals.

- Integrity: Maintaining the accuracy and reliability of data and preventing unauthorized changes.

- Availability: Ensuring that data and resources are accessible and usable when needed.

3. The three most common security threats are:

a. Malware: Viruses, trojans, and ransomware that can compromise system security.

b. Phishing: Deceptive emails or websites used to trick users into revealing sensitive information.

c. Insider Threats: Threats posed by employees or individuals with insider access to an organization's systems.

4. The three most common security measures are:

a. Firewalls: Network security systems that filter and monitor traffic.

b. Antivirus Software: Programs designed to detect and remove malware.

c. Access Control: Implementing authentication and authorization to restrict system access.

5. Ten guidelines for a comprehensive security system include:

a. Regularly update and patch software.

b. Use strong and unique passwords.

c. Implement encryption for sensitive data.

d. Conduct security training and awareness programs.

e. Monitor network traffic for anomalies.

f. Back up data regularly.

g. Limit user access based on need-to-know.

h. Employ multi-factor authentication.

i. Create an incident response plan.

j. Regularly audit and review security policies.

6. Business continuity planning is a process that ensures an organization can continue operating and providing services during and after a disaster or disruptive event. It involves developing strategies and procedures to maintain essential functions and recover quickly from disruptions.

7. Five examples of biometric security measures are:

a. Fingerprint recognition.

b. Facial recognition.

c. Iris or retinal scanning.

d. Voice recognition.

e. Palmprint recognition.

8. Zero trust security is an approach that assumes no trust in any user or system, even if they are inside the organization's network. Three principles of zero trust security are:

a. Verify Identity: Always authenticate and verify the identity of users and devices.

b. Least Privilege Access: Limit access to the minimum required for a user's role.

c. Continuous Monitoring: Continuously monitor and analyze network traffic for anomalies and potential threats.

Disclaimer: While we strive to provide accurate information online, it's essential to verify answers with your teacher when they pertain to your coursework. Online sources may contain errors, and individual classroom requirements can vary. We encourage you to use the information here as a reference but recommend confirming its accuracy and appropriateness with your instructor, as they play a vital role in guiding your learning. Your teacher is there to support you, and reaching out to them with questions or concerns is a valuable part of your educational journey.

User Oded Harth
by
6.6k points