Answers to Chapter 1 Questions
1. Confidentiality, integrity, and availability (CIA). The opposite factors of the security triad are disclosure, alteration, and destruction (DAD).
2. Availability. Because all the data is destroyed, the company cannot supply information or data to legitimate users.
3. The integrity factor is violated because the file contents were modified.
4. A third-party independent, certified, and licensed auditor is the best person to conduct an audit. Such a person can ensure that the audit is frank and devoid of favoritism.
5. Authentication helps double-check the person as the genuine person who was issued the identity card. Usually this involves the user remembering a PIN or code to enter and a way to prove that the person who entered the PIN is indeed the person who was issued the access card.
6. Logs and log files provide entries and details of intruders, attacks, and the time of entry and exit. Examining logs daily can demonstrate details of who is entering with authorization and who is an intruder. Firewall, database, and network logs also show any entries to demonstrate excessive logins, denial of service, or attacks coming from external IPs.
7. It is true that natural disasters cannot be avoided but the first priority of any disaster is to save human life. Establishing a chain of command, training and retraining employees regularly regarding how to handle natural disasters, and contacting employees when a disaster strikes to make sure of their safety are all very important.
8. Fire safety can be achieved by installing extinguishers and a sprinkling system but you must also consult local fire departments to determine their codes and laws. The fire department can advise the best possible solutions to be implemented.
9. Yes, corporations really save their development, test, and production software copies separately on code repositories by version and subversion numbers. All are well documented in each environment.
10. Corporate cybersecurity is the responsibility of everyone, although CEO and security officers are the owners and custodians who take care of implementing the policies and rules. This is the main reason why corporate security follows the rule of “if you see something, say something.”