Week 6 study questions exercises edited

1
Week 6 Study Questions & Exercises
Name
Institution Affiliation
Date
2
Study Questions
1. Briefly define each of the three members of the information security triad.
i)
Confidentiality: to ensure authorized individuals only access that information.
ii)
Integrity: to ensure that the information is intact in its original state and is not
modified in any way.
iii)
Availability: The information should be available to be accessed and altered by
authorized individuals.
2. What does the term authentication mean?
Authentication is to validate the users’ identification to ensure that an individual wanting
to access or use data systems or devices has the absolute right to do so.
3. What is multi-factor authentication?
To access an information system, the user must submit more than one form of
identification, known as Multi-Factor Authentication (MFA) (David, 2019).
4. What is role-based access control?
Role-based access control is a security measure used to limit system access to just those
users who have been granted permissions
5. .What is the purpose of encryption?
Encryption is mainly used to protect digital data as it moves from one information system
to another across the internet.
6. What are two good examples of a complex password?
• ^m5flU,56
• _loV@mai#dawg67
7. What is pretexting?
Pretexting is the act of convincing an individual to provide information to verify that their
identification is real.
8. What are the components of a good backup plan?
• It should be safe and encrypted offsite for accessibility in the event of total damage. • In
addition to disaster recovery processes, it should include a data recovery strategy.
• It should be examined frequently to ensure that it is operating correctly (David, 2019).
9. What is a firewall?
A firewall is a security mechanism that monitors the network’s systems by regulating the
inbound and outbound network traffic by security standards.
10. What does the term physical security mean?
It protects information systems from physical harm caused by disasters such as fire,
robbery, flooding, and terrorists.
Exercises
1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report
your findings, then state your own opinion about these technologies
Blockchain is a sophisticated computer coding mechanism that enables data
distribution across several machines. In other terms, blockchain technology is a
decentralized database that enables the creation of digital ledgers. Blockchain
technology is decentralized in the sense that databases can be accessed and amended
3
according to the choices of individual users. The advantage of blockchain is that it is
safe, as its developers cannot hack it. On the other hand, bitcoin is a decentralized and
digital means of payment that relies on blockchain technology to provide peer-to-peer
security. Bitcoin is merely an illustration of what blockchain technology is capable of
(David, 2019). Bitcoin users can access their funds from anywhere globally without
interference from outside parties.
2. Find the information security policy at your place of employment or study. Is it a
good policy? Does it meet the standards outlined in the chapter?
My school’s security policy complies with most regulations and best security
practices (David, 2019). As a result, I can attest that they adhere to industry standards,
as data breaches have been handled effectively thus far.
3. How diligent are you in keeping your information secure? Review the steps listed in
the chapter and comment on your security status.
Previously, I was not diligent enough in safeguarding my information. However,
since enrolling in this course, I’ve made numerous changes to ensure the security of
my data (David, 2019). I am aware of how to avoid phishing emails, my computer is
secure, and I am constantly vigilant for such assaults when using public networks.
Reference
David, T. (2019). Information systems for business and beyond. Saylor Academy.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with StudyAcademia.com
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat