Introduction to Information Security

Computer Science
Tutor: None Selected Time limit: 3 Days


1-Explain how to know yourself and/or to know your enemy

2-You may find using concrete examples of weighted factor analysis from an unrelated topic useful if this concept is not familiar to students. For example, what factors are considered when buying a new car? How much weight is each factor given?

3-Give an example of an operational, technical, and political feasibility analysis

4-Give examples of each of the five risk control strategies: defend, transference, mitigation, acceptance, & termination

5-Security policies are the least expensive control to execute, but the most difficult to implement properly. List the reasons shaping policy is difficult:
Also list the three types of management of security policies, according to The National Institute of Standards and Technology’s Special Publication 800-14.

6-Design of Security Architecture
List one of the sections that outline key security architectural components. To assess whether a framework and/or blueprint are on target to meet an organization’s needs you must have a working knowledge of these security architecture components.

7-What does SETA programs mean? Comment on one other students posting under this thread

8-Managers in the IT and information security communities are called on to provide strategic planning to assure the continuous availability of information systems. What are these continuity strategies?

Sep 26th, 2013
i can help you,i will do it perfect and quality
Sep 26th, 2013

I need everything with sources and references please. The main goal is the answers with

Sources and references, the teacher does'n accept the homework without it. 
Sep 26th, 2013

no problem i will do that tell me how much you are going to pay

Sep 26th, 2013

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Sep 26th, 2013
...
Sep 26th, 2013
Dec 5th, 2016
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer