0% found this document useful (0 votes)
15 views2 pages

Cybersecurity Individual Project

Uploaded by

emma.swanbeck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Cybersecurity Individual Project

Uploaded by

emma.swanbeck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity individual project

Because of the difficulty with doing a group project this semester, I am substituting an individual project,
instead.

This project will be graded pass/fail. Pass will be given 100% of the available points.

Fail will be given 0% of the available points.

To pass, I need to see a sincere effort.

The project is this: copy and paste the questions below into a new Word Document. Answer each
question, briefly. Save the word document and submit it to the “individual project” space in the
assignments tab on blackboard.

Use the textbook as a primary source. However, feel free to use the internet to look up other
information if the textbook is not sufficiently clear. You may also reference the slides for Security, but
the internet may be a better resource.

Questions follow. (Copy all after this line):

1. When protecting information, we want to be able to restrict access to those who are allowed to see it;
everyone else should be disallowed from learning anything about its contents. This is the essence of
what?

2. What is best described as the assurance that the information being accessed has not been altered and
truly represents what is intended?

3. What concept means that information can be accessed and modified by anyone authorized to do so in
an appropriate timeframe?

4. Name 3 types of authentication factors.

5. What type of more secure authentication combines two or more factors?

6. What determines who can read, modify and add and/or delete information?

7. the process of encoding data upon its transmission or storage so that only authorized individuals can
read it is called what?

8. Name several common policies that organizations should put in place regarding password security.

9. What is a hot site?


10. Is a firewall hardware or software? Can it be both?

11. What kind of system identifies if a network is being attacked?

12. What allows a user who is outside of a corporate network to take a detour around the firewall and
access the internal network from the outside?

13. What describes protection of the actual hardware and networking components that store and transmit
information resources?

14. What are some physical security measures that can be implemented?

15. What type of policy lays out the guidelines for employee use of the information resources of the
company and provides the company recourse in the case that an employee violates a policy?

16. Name some things you can do as an individual to protect your information security?

17.Should you trust an e-mail from your bank requesting you to click on a link to see an important
message?

18. What is “elicitation” in the IT security context?

19. Can you trust an e-mail if the sender’s e-mail address is correct?

20. What can you do to prevent social engineering?

21. What is unwanted e-mail called?

22. Should you download free software? When can you trust it?

23. What is phishing?

24. What is doxing?

25. What is baiting?

You might also like