Information Assurance and Security 2
Information Assurance and Security 2
Prelims 1&2
Third reason why investing in information security is significant
Proliferation of iot devices
First reason why investing in information security is significant
Rising cost of breaches
What jobs in information security is this
Salary: $104,000
m
Responsibilities: Create an in-office network for a small
er as
business or a cloud infrastructure for a business with corporate
co
eH w
locations in cities on opposite coasts.
o.
Computer Network Architects
rs e
Fourth reason why investing in information security is
ou urc
significant
Funded hackers and wide availability of hacking tools
o
significant
v i y re
False
ar stu
True
What jobs in information security is this?
Salary: $95,510
Responsibilities: Information security analysts monitor their
companies’ computer networks to combat hackers and compile
reports of security breaches.
Information Security Analyst
What jobs in information security is this?
This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00
https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
Salary: $139,000
Responsibilities: Information systems managers work toward
ensuring a company’s tech is capable of meeting their IT goals.
Computer and Information Systems Managers
What jobs in information security is this?
Salary: $103,560
Responsibilities: Software developers can be tasked with a wide
range of responsibilities that may include designing parts of
computer programs and applications and designing how those
pieces work together.
Software Developer
Fifth reason why investing in information security is significant
Regulatory compliances
m
er as
The need for skilled workers and allocation of funds for
co
security within their budget: companies are making the effort
eH w
to allocate more funds in their budgets for security.
o.
True
rs e
ou urc
PRELIMS
The Infrastructure Access Layer describes the notion that acce
o
aC s
kept may be granted only with the proper badge or any different
ar stu
etc.
Th
This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00
https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
A principle which is a core requirement of information security
for the safe utilization, flow, and storage of information is
the CIA triad.
The establishment of the Enigma rotor machine and the
subsequent emergence of electronics and computing enabled the
usage of much more elaborate schemes and
allowed confidentiality to be protected much more effectively.
To continue, confidentiality can be
easily breached so each employee in an organization or
company should be aware of his responsibilities in
maintaining confidentiality of the information delegated to him
for the exercise of his duties.
CIA stands for confidentiality, integrity, and availability and
m
er as
these are the three main objectives of information security.
co
Тhe concept of layers illustrates that data communications and
eH w
computer network protocols are designated to function in a
o.
rs e
layered manner, transferring the data from one layer to the next.
ou urc
The aim of confidentiality is to ensure that information is
hidden from people unauthorized to access it
The Physical Access Layer describes the notion that the
o
aC s
privileges.
sh is
Th
This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00
https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
Powered by TCPDF (www.tcpdf.org)