Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.29
Topic:

Information Security Management (IT & Computer Science Coursework)

Coursework Instructions:

Information Security Management
Personal Information Security Terminology.
The scenario of Ellie protecting her scooter was used in this chapter to introduce important key terms used in information security: asset, threat, threat actor, vulnerability, attack vector, attack surface, likelihood, and risk.
1. Create your own one-paragraph scenario with those key terms using a situation with which you are familiar.
2. Also, create a table similar to Table 1-5 that lists these terms and how they are used in your scenario.
Table 1-5 linked in the attachment, Please check it.
Please do your own work. It will submit on the Turnitin.
Submission will be sent to Turnitin to be electronically reviewed for plagiarism.

Coursework Sample Content Preview:

Information Security Management
Student:
Institution Affiliation:
Tutor:
Course:
Date:
Information Security Management
Lincoln, who was working at the Cambridge Analytics as the chief IT, was fired from the company shortly after the investigations following president Donald Trump’s win. Discontented, Lincoln decides to use his old credentials to enter into the Cambridge Analytica database and access files that he deems threat and can lead to him being jailed. Lincoln visits a hotel that offers free internet (Wi-Fi) while he tries to access the Cambridge database via its VPN. Luckily, Lincoln's credentials are intact and working as usual. Also, Lincoln installs a backdoor where he can still access his credentials even when they are blocked later.
In the underlying cause, the discontented employee, Lincoln, would be considered as the threat attacker. The asset to be considered would be Cambridge Analytica's information that needs to be deleted from the database. They can lead to Lincoln being jailed based on the U.S constitution. This follows from the fact the company aided Trump to win via Facebook. The vulnerability to be considered in the underlying case would be Lincoln's login credentials since he is already not a worker of the company. However, he can still access the login...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to abraham lincoln:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!