Privacy is a hot-button topic for most people. Discuss how the definition of privacy that is commonly used (freedom from observation) may differ from the definition of privacy from the information security perspective (freedom from unsanctioned intrusion). Privacy as used …

Privacy is a hot-button topic for most people. Discuss how the definition of privacy that is commonly used Read more »

Compile a list of ethical dilemmas you might face when you are on the job.  Why did you select these dilemmas?  How would you overcome them?  When I am at work, there are many situations where I have to make …

Compile a list of ethical dilemmas you might face when you are on the job. Why did you select these dilemmas? Read more »

Chapter 6 Review Questions/Answers What is the typical relationship among the untrusted network, the firewall, and the trusted network? Firewall regulates data between an untrusted and trusted networks. The data enters from an untrusted network to a firewall and the …

Chapter 6 Review Questions/Answers Information Security Read more »

Book Whitman, M. and Mattord, H. (2011). Principles of Information Security, 5th Edition.       Independence, KY: Cengage Learning. Chapter 9 Review Questions What is physical security? What are the primary threats to physical security? How are they made manifest in …

Chapter 9 Review Questions Principles of Information Security Read more »

Chapter 8 Review Questions Book Whitman, M. and Mattord, H. (2011). Principles of Information Security, 5th Edition.       Independence, KY: Cengage Learning. What are cryptography and cryptanalysis? Crypto comes from a Greek word Kryptos which means hidden and Graphein means …

Chapter 8 Review Questions Principles of Information Security Read more »