Question

In: Computer Science

Discusses at least five emerging threats to information security. Provides guidelines for creating strong passwords.

Discusses at least five emerging threats to information security.

Provides guidelines for creating strong passwords.

Solutions

Expert Solution

Information security means protecting information (data) and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Information Security management is a process of defining the security controls in order to protect the information assets.

1.Any potential danger to information or systems.
2.A threat is a possibility that someone (person, s/w) would identify and exploit the vulnerability.
3.The entity that takes advantage of vulnerability is referred to as a threat agent. E.g.: A threat agent could be an intruder accessing the network through a port on the firewall.
4.Exploiting information via remote access software
5.Sharing sensitive files on P2P networks.
6.Careless use of wireless networks

Use a unique password for each of your important accounts.
Use a mix of letters, numbers, and symbols in your password.
Don't use personal information or common words as a password.


Related Solutions

Identify and discuss at least five issues emerging economies face
Identify and discuss at least five issues emerging economies face
a)highlight any five emerging issues in information and communication technology
a)highlight any five emerging issues in information and communication technology
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
List at least five (5) operational guidelines that are used to monitor and control an activated...
List at least five (5) operational guidelines that are used to monitor and control an activated sludge system, and the typical range of each guideline in a healthy system
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
The steps to creating an information security plan would be in which of the following sequences?...
The steps to creating an information security plan would be in which of the following sequences? Identify threats, identify risks, design controls, incorporate controls into an enterprise-wide plan, Set forth policies Set forth policy, design controls, identify risks, identify threats, incorporate controls into an enterprise-wide plan
Describe an emerging trend in the development of healthcare information systems. Please share at least two...
Describe an emerging trend in the development of healthcare information systems. Please share at least two things you have learned from your research, and how you might find this valuable to you in your future career in Health Information Technology career.
Humans are the greatest threat to electronic health information. What are some of the threats to data security from people?
Humans are the greatest threat to electronic health information. What are some of the threats to data security from people?
Identify and explain at least five tax incentives that a host country provides to attract FDI.
Identify and explain at least five tax incentives that a host country provides to attract FDI.
What kind of difficulties there might be when creating an information security policy? What is required of them?
What kind of difficulties there might be when creating an information security policy? What is required of them?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT