Skip to main content
Engineering LibreTexts

1.6.S: Section #6 Summary

  • Page ID
    11506
  • Summary

    As computing and networking resources have become more and more an integral part of business, they have also become a target of criminals. Organizations must be vigilant with the way they protect their resources. The same holds true for us personally: as digital devices become more and more intertwined with our lives, it becomes crucial for us to understand how to protect ourselves.

     


    Study Questions

    1. Briefly define each of the three members of the information security triad.
    2. What does the term authentication mean?
    3. What is multi-factor authentication?
    4. What is role-based access control?
    5. What is the purpose of encryption?
    6. What are two good examples of a complex password?
    7. What is pretexting?
    8. What are the components of a good backup plan?
    9. What is a firewall?
    10. What does the term physical security mean?

     

    Exercises

     

    1. Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication.
    2. What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two- to three-page paper that describes at least two new advances in encryption technology.
    3. What is the password policy at your place of employment or study? Do you have to change passwords every so often? What are the minimum requirements for a password?
    4. When was the last time you backed up your data? What method did you use? In one to two pages, describe a method for backing up your data. Ask your instructor if you can get extra credit for backing up your data.
    5. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
    6. How are you doing on keeping your own information secure? Review the steps listed in the chapter and comment on how well you are doing.

    1. "Born to be breached" by Sean Gallagher on Nov 3 2012. Arstechnica. Retrieved from http://arstechnica.com/information-t...e-most-common/ on May 15, 2013.
    2. SANS Institute. "A Short Primer for Developing Security Policies." Accessed from http://www.sans.org/security-resourc...icy_Primer.pdf on May 31, 2013.
    3. Taken from SANS Institute's Mobile Device Checklist. You can review the full checklist at www.sans.org/score/checklists/mobile-device-checklist.xls.‎