Chapter 1 Questions
1. What are the three factors of a security triad? What are their opposite factors?
2. If a company has lost all its data from repositories and cannot find backup copies, what factor or security triad does the company violate?
3. If an approved and authorized user requests a file and finds that the contents of the file have been modified, what security factor have the changes in the file violated?
4. Who is the best person to do accounting or auditing in a corporation?
5. Why is authentication required when a user can scan their identity card to enter a secure building?
6. What is the importance of logs in IT and cybersecurity?
7. When natural disasters are unavoidable, why should a corporation worry about them?
8. How should a corporation implement physical fire safety for its buildings?
9. Do corporations really save development, test, and production copies of software?
10. Who is ultimately responsible for security in an IT organization?