Controls For Information Security Instructor's Manual Learning Objectives
Controls For Information Security Instructor's Manual Learning Objectives
Instructors Manual
Learning Objectives:
Figure 8-1 on page 230 shows the five fundamental principles that
contribute to the overall objective of systems reliability:
Multiple Choice 1
1. Length
3. Randomness
4. Change frequently
Authorization Controls
Authorization restricts access of authenticated users to
specific portions of the system and specifies what actions
they are permitted to perform.
Training
Just how common is a source of heated debate in the credit card fraud
world, which has always been shrouded in secrecy. But one firm that
provides security services to merchants says its been told by the card
associations that last year, 60 million accounts were compromised, and
this year, that figure will double to around 120 million.
And everyone I talk to says that number is conservative, says Julie
Ferguson, co-founder of ClearCommerce Corp., which sells products
designed to stop data theft. Ferguson also chairs the Merchant Risk
Council, which studies credit card fraud and advocates for merchant
rights.
Filtering Packets
Dial-Up Connections
Wireless Access
1. Host configuration
2. User accounts
3. Software design
1. Host Configuration
3. Software Design
Multiple Choice 2
Social engineering attacks that take place via e-mail are known as:
a. bluesnarfing
b. spear phishing
c. phreaking
d. vishing
Multiple Choice 3
Multiple Choice 4