Solution Manual For Principles of Information Security – 5th Edition by Michael E. Whitman, Herbert J. Mattord

$55.00

Solution Manual For Principles of Information Security – 5th Edition by Michael E. Whitman, Herbert J. Mattord

Category:

Description

You will receive this product within 24 hours after placing the order

INSTANT DOWNLOAD

What student Can Expect From A Test Bank?

A test bank will include the following questions:

  1. True/False
  2. Multiple Choice Questions
  3. Matching Questions
  4. Fill In The Blanks
  5. Essay Questions
  6. Short  Questions

Description

Chapter 6 Answers to Review Questions and Exercises

Review Questions

  1. What is risk management?

Answer: Risk management is the process of discovering and assessing the risks to an organization’s operations and determining how those risks can be controlled or mitigated.

  1. List and describe the key areas of concern for risk management.

Answer: Risk identification, risk assessment, risk appetite, and risk control.

  1. Why is identification of risks, through a listing of assets and their vulnerabilities, so important to the risk management process?

Answer: It is important because management needs to know the value of each company asset and what losses will be incurred if an asset is compromised.

  1. According to Sun Tzu, what two things must be achieved to secure information assets successfully?

Answer: To reduce risk in an organization, the organization must know itself (including its assets and processes used to protect them) and know its enemy (the nature of the threats it faces).

  1. Who is responsible for risk management in an organization?

Answer: All stakeholders in the organization are responsible; management is accountable.

  1. Which community of interest usually takes the lead in information asset risk management?

Answer: Management usually takes the lead in information asset risk management. Management must begin the identification process for threats and risks to the company.

  1. Which community of interest usually provides the resources used when undertaking information asset risk management?

Answer: The resources used when undertaking information asset risk management are usually provided by all three communities: InfoSec, IT, and general management.

  1. In risk management strategies, why must periodic reviews be a part of the process?

Answer: Periodic reviews must be a part of risk management strategies because threats are constantly changing for a company. As a vulnerability of specific concern becomes completely managed by an existing control, it may no longer need to be considered for additional controls, just as new vulnerabilities may require the implementation of new controls.

  1. Why do networking components need more examination from an InfoSec perspective than from a systems development perspective?

Answer: Networking components need more examination from an InfoSec perspective than from a systems development perspective because networking subsystems are often the entry point for external threats and the focal point of many attacks against the system.

  1. What value would an automated asset inventory system have for the risk identification process?

Answer: An automated asset inventory system would be valuable to the risk identification process because all hardware components are already identified by model, make, and location. Thus, management can review the system for the most critical items and assess their values.

  1. Which information attributes are seldom or never applied to software elements?

Answer: Several information attributes are not often tracked for software, including:

  • IP address
  • MAC address
  • Manufacturer’s model or part number
  1. Which information attribute is often of great value for networking equipment when the Dynamic Host Configuration Protocol (DHCP) is not used?

Answer: If the IP address can be tied to specific assets, it can be very useful for asset tracking.

  1. When you document procedures, why is it useful to know where the electronic versions are stored?

Answer: It is useful because the documents can be updated when required and can be retrieved quickly if systems are unavailable.

  1. Which is more important to the information asset classification scheme: that it be comprehensive or that it be mutually exclusive?

Answer: A comprehensive information asset classification scheme is more desirable because it implies that all assets will be included, even if they appear in more than one location.

  1. What is the difference between an asset’s ability to generate revenue and its ability to generate profit?

Answer: Some assets may be able to operate and create revenue, but unable to earn a profit after expenses are paid.

  1. How many categories should a data classification scheme include? Why?

Answer: An organization would need as many categories as necessary to include all of the different groupings with the appropriate levels of care. This chapter describes an approach that uses Public, Internal, and Confidential categories.

  1. How many threat categories are listed in this chapter? Which is noted as being the most frequently encountered, and why?

Answer: Twelve threat categories are discussed in the chapter. The most frequently encountered category is often “human error or failure” because it is often the hardest to control, as access must be given to trusted insiders as a requirement for them to perform their assigned duties.

  1. What are vulnerabilities?

Answer: Vulnerabilities are opportunities for a threat to become a loss.

  1. Describe the TVA worksheet. What is it used for?

Answer: The TVA worksheet combines a prioritized list of assets and their vulnerabilities and a list that prioritizes threats facing the organization. The resulting grid provides a convenient method of examining the “exposure” of assets, allowing a simple vulnerability assessment.

  1. Examine the simplest risk formula presented in this chapter. What are its primary elements?

Answer: The primary elements in risk estimation are likelihood of loss, value exposed to loss, percent of potential loss already controlled, and an allowance for uncertainty.

Exercises

Answers will vary.

Reviews

There are no reviews yet.

Be the first to review “Solution Manual For Principles of Information Security – 5th Edition by Michael E. Whitman, Herbert J. Mattord”

Your email address will not be published. Required fields are marked *