PRIYA LR&CFS QUIZ-2

.docx

School

Southeast Missouri State University *

*We aren’t endorsed by this school

Course

650

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by GeneralExploration6683

Report
NAME: PUSHPA PRIYA MIKKILI SEMO.ID: S02048083 CY-650 Legal, Risk, and Compliance for Security Assignment-2 1. Why is information security a management problem? What can management do that technology cannot? Information security is a management concern since it is management that establishes security guidelines, grants permission for new technology, and monitors compliance. The use of technology will not be regulated if policy is not implemented. An important duty of management, which is also in charge of risk management, is choosing the technologies to be included in disaster recovery plans. There will undoubtedly be costly damages if management is not able to create plans. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? Without data, a company would not be able to perform its daily operations since data embodies the power to provide value to its consumers. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? To protect the organization's capacity to function, information security must be put in place, and general management and IT management are jointly accountable for this duty. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is generally associated with higher risk for businesses that use information technology. This is a result of possible attackers having easier and more access to these information systems when they are networked, particularly if they are linked to the Internet.
5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. Assets can be held captive to an attacker's demands if they have control over access to them. To extort money or other valuables from the owner in exchange for sharing the encryption key, an attacker could, for instance, be able to access a set of data in a database and encrypt it, allowing the owner to use the data. -----THE END-----
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help