Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 1 Q&A

1:

Which resources in a network are considered the most trusted?

A1:

Answer: The resources in a network that are considered the most trusted include internal servers, domain controllers, and network-attached devices.

2:

List five types of malware.

A2:

Answer: Five types of malware are viruses, worms, Trojan horses, spyware, and hoaxes.

3:

What is a hoax?

A3:

Answer: A hoax is a special kind of malware. Hoaxes do not contain any code, instead relying on the gullibility of the users to spread them. They often use emotional subjects such as a child's last wish. Any e-mail message that asks you to forward copies to everyone you know is almost certainly a hoax.

4:

What is the difference between a hacker and a cracker?

A4:

Answer: A hacker is a person who is proficient with computers and does no malicious damage whatsoever. A hacker is often driven by a passion for computing but is not bent on harming systems. A cracker, on the other hand, uses various tools and techniques to gain illegal access to various computer platforms and networks.

5:

Attacks often come from inside your organization. List three potential threats from inside an organization.

A5:

Answer: Three potential threats from inside an organization include authenticated users, unauthorized programs, and unpatched software.

6:

Who is involved in the security process of an organization?

A6:

Answer: Many people are involved in the security process of an organization, including senior management, users, and the government (because it makes legal requirements that an organization has to follow).

7:

Name two legal requirements made by government agencies.

A7:

Answer:

  • HIPAA
    The Health Insurance Portability and Accountability Act restricts disclosure of health-related data along with personally identifying information.

  • GLB
    The Gramm-Leach-Bliley Act affects U.S. financial institutions and requires disclosure of privacy policies to customers.

  • ECPA
    The Electronic Communications Privacy Act specifies who can read whose e-mails under what conditions.

8:

What is CIA?

A8:

Answer: CIA stands for the following:

  • Confidentiality
    Ensure that no data is disclosed intentionally or unintentionally.

  • Integrity
    Make sure that no data is modified by unauthorized personnel, that no unauthorized changes are made by authorized personnel, and that the data remains consistent, both internally and externally.

  • Availability
    Provide reliable and timely access to data and resources.

9:

What is SLE?

A9:

Answer: SLE stands for Single Loss Expectancy. To calculate this value, you need to know the Annualized Rate of Occurrence (ARO) and the monetary loss associated with an asset. This is the value that represents how much money would be lost if the risk occurred. This includes the price of the new equipment, the hourly wage of the people replacing the equipment, and the cost of employees unable to perform their work.

10:

What is ALE?

A10:

Answer: To plan for the probable risk, you need to budget for the possibility that the risk will happen. To do this, you need to use the ARO and the SLE to find the Annual Loss Expectancy (ALE).


/ 196