As computing and networking resources have become more and more an integral part of business, they have also become a target of criminals. Organizations must be vigilant with the way they protect their resources. The same holds true for us personally: as digital devices become more and more intertwined with our lives, it becomes crucial for us to understand how to protect ourselves.
- Briefly define each of the three members of the information security triad.
- What does the term authentication mean?
- What is multi-factor authentication?
- What is role-based access control?
- What is the purpose of encryption?
- What are two good examples of a complex password?
- What is pretexting?
- What are the components of a good backup plan?
- What is a firewall?
- What does the term physical security mean?
- Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication.
- What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two- to three-page paper that describes at least two new advances in encryption technology.
- What is the password policy at your place of employment or study? Do you have to change passwords every so often? What are the minimum requirements for a password?
- When was the last time you backed up your data? What method did you use? In one to two pages, describe a method for backing up your data. Ask your instructor if you can get extra credit for backing up your data.
- Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
- How are you doing on keeping your own information secure? Review the steps listed in the chapter and comment on how well you are doing.
- "Born to be breached" by Sean Gallagher on Nov 3 2012. Arstechnica. Retrieved from http://arstechnica.com/information-t...e-most-common/ on May 15, 2013.↵
- SANS Institute. "A Short Primer for Developing Security Policies." Accessed from http://www.sans.org/security-resourc...icy_Primer.pdf on May 31, 2013.↵
- Taken from SANS Institute's Mobile Device Checklist. You can review the full checklist at www.sans.org/score/checklists/mobile-device-checklist.xls. ↵