Week 6 study questions exercises edited
1
Week 6 Study Questions & Exercises
Name
Institution Affiliation
Date
2
Study Questions
1. Briefly define each of the three members of the information security triad.
i)
Confidentiality: to ensure authorized individuals only access that information.
ii)
Integrity: to ensure that the information is intact in its original state and is not
modified in any way.
iii)
Availability: The information should be available to be accessed and altered by
authorized individuals.
2. What does the term authentication mean?
Authentication is to validate the users’ identification to ensure that an individual wanting
to access or use data systems or devices has the absolute right to do so.
3. What is multi-factor authentication?
To access an information system, the user must submit more than one form of
identification, known as Multi-Factor Authentication (MFA) (David, 2019).
4. What is role-based access control?
Role-based access control is a security measure used to limit system access to just those
users who have been granted permissions
5. .What is the purpose of encryption?
Encryption is mainly used to protect digital data as it moves from one information system
to another across the internet.
6. What are two good examples of a complex password?
• ^m5flU,56
• _loV@mai#dawg67
7. What is pretexting?
Pretexting is the act of convincing an individual to provide information to verify that their
identification is real.
8. What are the components of a good backup plan?
• It should be safe and encrypted offsite for accessibility in the event of total damage. • In
addition to disaster recovery processes, it should include a data recovery strategy.
• It should be examined frequently to ensure that it is operating correctly (David, 2019).
9. What is a firewall?
A firewall is a security mechanism that monitors the network’s systems by regulating the
inbound and outbound network traffic by security standards.
10. What does the term physical security mean?
It protects information systems from physical harm caused by disasters such as fire,
robbery, flooding, and terrorists.
Exercises
1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report
your findings, then state your own opinion about these technologies
Blockchain is a sophisticated computer coding mechanism that enables data
distribution across several machines. In other terms, blockchain technology is a
decentralized database that enables the creation of digital ledgers. Blockchain
technology is decentralized in the sense that databases can be accessed and amended
3
according to the choices of individual users. The advantage of blockchain is that it is
safe, as its developers cannot hack it. On the other hand, bitcoin is a decentralized and
digital means of payment that relies on blockchain technology to provide peer-to-peer
security. Bitcoin is merely an illustration of what blockchain technology is capable of
(David, 2019). Bitcoin users can access their funds from anywhere globally without
interference from outside parties.
2. Find the information security policy at your place of employment or study. Is it a
good policy? Does it meet the standards outlined in the chapter?
My school’s security policy complies with most regulations and best security
practices (David, 2019). As a result, I can attest that they adhere to industry standards,
as data breaches have been handled effectively thus far.
3. How diligent are you in keeping your information secure? Review the steps listed in
the chapter and comment on your security status.
Previously, I was not diligent enough in safeguarding my information. However,
since enrolling in this course, I’ve made numerous changes to ensure the security of
my data (David, 2019). I am aware of how to avoid phishing emails, my computer is
secure, and I am constantly vigilant for such assaults when using public networks.
Reference
David, T. (2019). Information systems for business and beyond. Saylor Academy.
…