Cybersecurity Individual Project
Cybersecurity Individual Project
Because of the difficulty with doing a group project this semester, I am substituting an individual project,
instead.
This project will be graded pass/fail. Pass will be given 100% of the available points.
The project is this: copy and paste the questions below into a new Word Document. Answer each
question, briefly. Save the word document and submit it to the “individual project” space in the
assignments tab on blackboard.
Use the textbook as a primary source. However, feel free to use the internet to look up other
information if the textbook is not sufficiently clear. You may also reference the slides for Security, but
the internet may be a better resource.
1. When protecting information, we want to be able to restrict access to those who are allowed to see it;
everyone else should be disallowed from learning anything about its contents. This is the essence of
what?
2. What is best described as the assurance that the information being accessed has not been altered and
truly represents what is intended?
3. What concept means that information can be accessed and modified by anyone authorized to do so in
an appropriate timeframe?
6. What determines who can read, modify and add and/or delete information?
7. the process of encoding data upon its transmission or storage so that only authorized individuals can
read it is called what?
8. Name several common policies that organizations should put in place regarding password security.
12. What allows a user who is outside of a corporate network to take a detour around the firewall and
access the internal network from the outside?
13. What describes protection of the actual hardware and networking components that store and transmit
information resources?
14. What are some physical security measures that can be implemented?
15. What type of policy lays out the guidelines for employee use of the information resources of the
company and provides the company recourse in the case that an employee violates a policy?
16. Name some things you can do as an individual to protect your information security?
17.Should you trust an e-mail from your bank requesting you to click on a link to see an important
message?
19. Can you trust an e-mail if the sender’s e-mail address is correct?
22. Should you download free software? When can you trust it?