info assurance & security tutorial 1

1
TIA2221 Information Assurance and Security Tutorial 1 1. Explain why someone wants to hack your computer? Describe what kind of information that can be derived from the hack ? 2. Describe how we could protect our data and minimize damage from hacking for Windows based system? 3. Describe different categories of hackers trading in black market? 4. Why is necessary integrate information assurance and security policies and regulation? 5. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notary B. Certification authority C. Key distribution center D. Key revocation certificate 6.A timely review of system access records would be an example of which basic security function? A. Avoidance B. Deterrence C. Prevention D. Detection

Upload: ahmad-fahmi

Post on 18-Feb-2016

6 views

Category:

Documents


0 download

DESCRIPTION

Question only

TRANSCRIPT

Page 1: Info Assurance & Security Tutorial 1

TIA2221 Information Assurance and Security Tutorial 1

1. Explain why someone wants to hack your computer? Describe what kind of information that can be derived from the hack ?

2. Describe how we could protect our data and minimize damage from hacking for Windows based system?

3. Describe different categories of hackers trading in black market?

4. Why is necessary integrate information assurance and security policies and regulation?

5. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notaryB. Certification authorityC. Key distribution center D. Key revocation certificate

6.A timely review of system access records would be an example of which basic security function? A. Avoidance B. Deterrence C. Prevention D. Detection