Security, privacy and Ethics

8 important questions on Security, privacy and Ethics

Why is security NOT an IT problem?

  • Management priority
  • Security investments return negative deliverable (added value)
  • Security is difficult to fund
  • It is a trade-off; purchase more security or accept higher risks?

What is risk assessment?

  • Audit the current resources
  • Map the current state of IS security
  • Outcomes; expose vulnerabilities and provide base for risk analysis.

What are the three (four) risk mitigation strategies?

  1. Accept risks; higher potential failure costs
  2. Risk reduction; invest in safeguards and pay for security measures
  3. Risk transferense; passing a portion or all risk to an third party, pay someone else to assume the risk
  4. Take no risk, stop with the tasks that cause the risk
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What are internal risk threats?

  • Intentional maliciousu behaviour; ill-willed employees
  • Careles behaviour; ignorance of disinterest in security problems

What are external risk threats?

  • Intrusion, hacker gains access
  • Social engineering, lying  to users
  • Phising, sending spam to capture data
  • Security weaknesses; exploiting weakness in software infra to enable unauthorized acces.
  • BAckdoors; code expressly designed to allow apps bij circumventing password protection (build by engineers to simplify upgrading or maintenance tasks)

How can you respond to internal security threats?

security policies; spell ou the behavirous that employees should follow to minimize security risks.
Specifying; password standars, user rights, legitimate use of port devices.
Firm should audit this regurlarly

How to respond to external threats?

Intrusion; use of passwords, firewalls, and encryption
Mall ware, installing detection software, training and policies.

What are fair information practices?

  • Notice; refers to the right of individuals to be informed when personal data is being collected and how it will be used
  • Choice; informed and objected to the information
  • Acces; individuals need to be able to acces information
  • Security, organizaitons need to secure the information
  • enforcement; procedures are upheld

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo