SlideShare a Scribd company logo
1 of 8
BCJ 4385, Workplace Security 1
UNIT IV STUDY GUIDE
Information, Communications, and
Computer Security
Course Learning Outcomes for Unit IV
Upon completion of this unit, students should be able to:
1. Examine the function of information security management
and how it
plays a role in assessing vulnerabilities to critical information.
2. Analyze various information protection strategies and how
these can
play a role in the prevention of cybercrimes.
3. Outline strategies for safeguarding information including the
protection
strategies of physical security, administrative controls, and
logical
controls.
Unit Lesson
General Overview
Information is an asset for organizations that exists in various
forms (critical,
propriety, intellectual, and digitized). Thus, securing the
various forms of
information are priorities for organizations. Laws such as the
Fair Credit
Reporting Act were created to help protect information from
improper use, but
such measures are insufficient in providing the level of
protection needed to
secure organizational information.
Organizations use various tools and strategies to ensure
information security
(INFOSEC) which is the protection of “information assets and
systems against
any internal or external threat that might endanger them”
(Ortmeier, 2013,
p.135). INFOSEC risk assessments and analyses are conducted
to identify the
threats against organizational information that may exist and
information
protection strategies are implemented to protect against and
respond to the
identified threats. Protection strategies range from control
strategies
(discretionary access control, mandatory access control:
hierarchical and
non-hierarchical, operations security) to personnel security
(information
protection-related agreements) which includes information
security legislation
(e.g., National Security Decision Directive 298), classification
systems for
business information (e.g., sensitive compartmented information
protocols),
information security policies, and copyrights, patents, and
trademarks.
Communication security (COMSEC) is important for any
information transmitted
regardless of the medium (e.g., voice, electronic, impulses,
microwave, etc.).
Computer security is concerned with information accessible
through computers.
Maintaining computer security is a complicated task because
information can be
accessed locally and remotely through numerous means. The
term cybercrime
was coined to identify the crimes that are associated with using
the internet to
illegally gain access to information that is used in crimes (e.g.,
hacking, email
wiretappings, phishing, and vishing).
Thus one can image that one of the greatest challenges related
to computer
security is securing computer databases from internal and
external threats.
Government agencies have added issues of protection threats
against their
agencies and their personnel. To aid all organizations in
maintaining computer
Reading
Assignment
Chapter 6:
Information,
Communications, and
Computer Security
Learning Activities
(Non-Graded)
See information below.
Key Terms
Refer to the key terms
within the textbook.
BCJ 4385, Workplace Security 2
security various computer protection strategies are utilized
(physical security,
administrative controls, and logical controls: passwords,
firewalls, malware).
Research has suggested strategies for safeguarding sensitive
computer
information (e.g., Carroll’s 10 strategies) and the federal
government has
enacted legislation to research and develop cyber security
measures (e.g., the
Cyber Security Research and Development Act of 2002).
Existing strategies
and the continued development of future strategies are
necessary to ensure
that information, communication, and computer security is
maintained in
organizations.
References:
Ortmeier, P.J. (2013). Introduction to security: Operations and
management
(4th ed.). Upper Saddle River, NJ: Pearson.
Questions to Consider
1. What types of information assets are used by organizations?
2. What types of information security tools and strategies do
organizations use to secure their information assets?
3. What types of legislation has been enacted in the United
States to
assist with information security and what policies have
resulted?
4. What is communication security? What is computer security?
How are
communication and computer security related?
5. What are the various types of cybercrime that exist?
6. What are the challenges associated with maintaining
computer
security?
7. What computer protection strategies and policies have been
suggested
and enacted?
8. What additional research and development is needed in the
area of
cyber security?
Learning Activities (Non-Graded)
1. Think about the various organizations in your community that
process a
lot of information. Pick one organization and conduct an
INFOSEC risk
assessment and analysis. You can search the internet for ideas
about
what specific criteria are assessed, instructions about how the
assessments and analyses are conducted, and examples of the
finished product. Were there any identified risks that surprised
you?
Were there risks that you expected to find that you did not?
2. As a continuation of activity #1, brainstorm about the
information
protection strategies that you would utilize to protect the
organization’s
information assets. What control strategies would you use?
What
information security legislation is relevant and what related
policies
would you implement? How would you ensure personnel
security
associated with the organization’s information assets?
3. As a continuation of activity #2, select one of the current
hacking
examples and explore the computer protection strategies that
were
implemented, should have been implemented, and will need to
be
implemented in the future. Are any of Carroll’s 10 strategies
applicable? What type of security research is needed and what
types of
strategies, policies and/or programs should be developed?
Non-graded Learning Activities are provided to aid students in
their course of
study. You do not have to submit them. If you have questions,
contact your
instructor for further guidance and information.
Short Essay Questions:
Answer three of the following questions. Each answer should be
2-3 paragraphs long. Answers are worth 10 points each.
1) Discuss the Persians. Who were they? What feats did they
achieve within their empire that were the first in the western
world?
2) What was the First International Period of Trade? When did
it occur? Who was involved? What were they trading?
3) Discuss the Tale of the Eloquent Peasant. What insight does
it offer into Egyptian society? What period of Egyptian history
does this take place in and what concerns were present in
society at the time?
4) Discuss the founding of the Spartan government as detailed
in class. What is the type and structure of governance set forth
and by whom? Who benefits from this style of rule and who is
deprived?
5) Detail the unique nature of Jericho. Why was it considered
the “Brewing Place for the Emergence of Civilization”?
C) Fill in the Blank Questions:
Provide the missing word/phrase for each of the following.
Answers are worth 1 point per blank. Yes a few bonus points
are possible in this section!
1) ____________ was used for the first time at the palace of
Knossos on Crete to reinforce the structure.
2) The Hebrews constructed the Great Temple of Solomon
around 960 BCE. The Temple housed the ___________. The
Temple was destroyed by the __________ in the early 6th
century BCE. King ________ agreed to help the Hebrews
rebuild the Temple in exchange for military aid.
3) __________ was the mortuary temple of the great pharaoh
Hatchepsut.
4) The Hymn to Aten represents a (perhaps unwanted) shift in
religious practice for Egyptians toward a __________ society.
5) The ___________ are responsible for bringing iron
technology and their _______ to the Greek speaking world.

More Related Content

Similar to BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx

Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxjeanettehully
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk ModelsDavid Sweigert
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsCSCJournals
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security PoliciesLaura Martin
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 

Similar to BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx (20)

Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Review questions
Review questionsReview questions
Review questions
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 

More from JASS44

BEAUTIFUL CHURCH ___________________ SIX STEPS TO.docx
BEAUTIFUL CHURCH ___________________ SIX STEPS  TO.docxBEAUTIFUL CHURCH ___________________ SIX STEPS  TO.docx
BEAUTIFUL CHURCH ___________________ SIX STEPS TO.docxJASS44
 
Be sure to include in your reply specific commentary examining the.docx
Be sure to include in your reply specific commentary examining the.docxBe sure to include in your reply specific commentary examining the.docx
Be sure to include in your reply specific commentary examining the.docxJASS44
 
Be sure that your report answers the following questions 1. W.docx
Be sure that your report answers the following questions 1. W.docxBe sure that your report answers the following questions 1. W.docx
Be sure that your report answers the following questions 1. W.docxJASS44
 
Be sure your paper touches on the key elements of each as they per.docx
Be sure your paper touches on the key elements of each as they per.docxBe sure your paper touches on the key elements of each as they per.docx
Be sure your paper touches on the key elements of each as they per.docxJASS44
 
Beasts of No Nation EssayTimelineWeek of April 10-13 Watch .docx
Beasts of No Nation EssayTimelineWeek of April 10-13  Watch .docxBeasts of No Nation EssayTimelineWeek of April 10-13  Watch .docx
Beasts of No Nation EssayTimelineWeek of April 10-13 Watch .docxJASS44
 
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxJASS44
 
Be sure to read Chopins Desirees Baby very carefully.Its un.docx
Be sure to read Chopins Desirees Baby very carefully.Its un.docxBe sure to read Chopins Desirees Baby very carefully.Its un.docx
Be sure to read Chopins Desirees Baby very carefully.Its un.docxJASS44
 
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docxBBA 3301 Unit V AssignmentInstructions Enter all answers dire.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docxJASS44
 
BBA 3361, Professionalism in the Workplace 1 Course Desc.docx
BBA 3361, Professionalism in the Workplace 1 Course Desc.docxBBA 3361, Professionalism in the Workplace 1 Course Desc.docx
BBA 3361, Professionalism in the Workplace 1 Course Desc.docxJASS44
 
Be sure to listen to all of the pieces first, then answer the ques.docx
Be sure to listen to all of the pieces first, then answer the ques.docxBe sure to listen to all of the pieces first, then answer the ques.docx
Be sure to listen to all of the pieces first, then answer the ques.docxJASS44
 
BCJ 2002, Theory and Practices of Corrections 1 Cour.docx
BCJ 2002, Theory and Practices of Corrections  1  Cour.docxBCJ 2002, Theory and Practices of Corrections  1  Cour.docx
BCJ 2002, Theory and Practices of Corrections 1 Cour.docxJASS44
 
BBA 3651, Leadership 1 Course Description Leadershi.docx
BBA 3651, Leadership 1 Course Description  Leadershi.docxBBA 3651, Leadership 1 Course Description  Leadershi.docx
BBA 3651, Leadership 1 Course Description Leadershi.docxJASS44
 
Basics of QuotingA guideline for good quoting is to integrate.docx
Basics of QuotingA guideline for good quoting is to integrate.docxBasics of QuotingA guideline for good quoting is to integrate.docx
Basics of QuotingA guideline for good quoting is to integrate.docxJASS44
 
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docx
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docxBDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docx
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docxJASS44
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxJASS44
 
Based on the materials for this week, create your own unique Datab.docx
Based on the materials for this week, create your own unique Datab.docxBased on the materials for this week, create your own unique Datab.docx
Based on the materials for this week, create your own unique Datab.docxJASS44
 
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docxBBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docxJASS44
 
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docxBBA 3310 Unit VI AssignmentInstructions Enter all answers.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docxJASS44
 
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docxBBA 3301 Unit V AssignmentInstructions Enter all answers direct.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docxJASS44
 
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docx
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docxBasic Guide to Program Evaluation (Including Outcomes Evaluation).docx
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docxJASS44
 

More from JASS44 (20)

BEAUTIFUL CHURCH ___________________ SIX STEPS TO.docx
BEAUTIFUL CHURCH ___________________ SIX STEPS  TO.docxBEAUTIFUL CHURCH ___________________ SIX STEPS  TO.docx
BEAUTIFUL CHURCH ___________________ SIX STEPS TO.docx
 
Be sure to include in your reply specific commentary examining the.docx
Be sure to include in your reply specific commentary examining the.docxBe sure to include in your reply specific commentary examining the.docx
Be sure to include in your reply specific commentary examining the.docx
 
Be sure that your report answers the following questions 1. W.docx
Be sure that your report answers the following questions 1. W.docxBe sure that your report answers the following questions 1. W.docx
Be sure that your report answers the following questions 1. W.docx
 
Be sure your paper touches on the key elements of each as they per.docx
Be sure your paper touches on the key elements of each as they per.docxBe sure your paper touches on the key elements of each as they per.docx
Be sure your paper touches on the key elements of each as they per.docx
 
Beasts of No Nation EssayTimelineWeek of April 10-13 Watch .docx
Beasts of No Nation EssayTimelineWeek of April 10-13  Watch .docxBeasts of No Nation EssayTimelineWeek of April 10-13  Watch .docx
Beasts of No Nation EssayTimelineWeek of April 10-13 Watch .docx
 
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxBCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docx
 
Be sure to read Chopins Desirees Baby very carefully.Its un.docx
Be sure to read Chopins Desirees Baby very carefully.Its un.docxBe sure to read Chopins Desirees Baby very carefully.Its un.docx
Be sure to read Chopins Desirees Baby very carefully.Its un.docx
 
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docxBBA 3301 Unit V AssignmentInstructions Enter all answers dire.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers dire.docx
 
BBA 3361, Professionalism in the Workplace 1 Course Desc.docx
BBA 3361, Professionalism in the Workplace 1 Course Desc.docxBBA 3361, Professionalism in the Workplace 1 Course Desc.docx
BBA 3361, Professionalism in the Workplace 1 Course Desc.docx
 
Be sure to listen to all of the pieces first, then answer the ques.docx
Be sure to listen to all of the pieces first, then answer the ques.docxBe sure to listen to all of the pieces first, then answer the ques.docx
Be sure to listen to all of the pieces first, then answer the ques.docx
 
BCJ 2002, Theory and Practices of Corrections 1 Cour.docx
BCJ 2002, Theory and Practices of Corrections  1  Cour.docxBCJ 2002, Theory and Practices of Corrections  1  Cour.docx
BCJ 2002, Theory and Practices of Corrections 1 Cour.docx
 
BBA 3651, Leadership 1 Course Description Leadershi.docx
BBA 3651, Leadership 1 Course Description  Leadershi.docxBBA 3651, Leadership 1 Course Description  Leadershi.docx
BBA 3651, Leadership 1 Course Description Leadershi.docx
 
Basics of QuotingA guideline for good quoting is to integrate.docx
Basics of QuotingA guideline for good quoting is to integrate.docxBasics of QuotingA guideline for good quoting is to integrate.docx
Basics of QuotingA guideline for good quoting is to integrate.docx
 
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docx
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docxBDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docx
BDM Scheme of Work.docScheme of WorkBTEC HND in Busine.docx
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
 
Based on the materials for this week, create your own unique Datab.docx
Based on the materials for this week, create your own unique Datab.docxBased on the materials for this week, create your own unique Datab.docx
Based on the materials for this week, create your own unique Datab.docx
 
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docxBBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers dir.docx
 
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docxBBA 3310 Unit VI AssignmentInstructions Enter all answers.docx
BBA 3310 Unit VI AssignmentInstructions Enter all answers.docx
 
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docxBBA 3301 Unit V AssignmentInstructions Enter all answers direct.docx
BBA 3301 Unit V AssignmentInstructions Enter all answers direct.docx
 
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docx
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docxBasic Guide to Program Evaluation (Including Outcomes Evaluation).docx
Basic Guide to Program Evaluation (Including Outcomes Evaluation).docx
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docx

  • 1. BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE Information, Communications, and Computer Security Course Learning Outcomes for Unit IV Upon completion of this unit, students should be able to: 1. Examine the function of information security management and how it plays a role in assessing vulnerabilities to critical information. 2. Analyze various information protection strategies and how these can play a role in the prevention of cybercrimes. 3. Outline strategies for safeguarding information including the protection strategies of physical security, administrative controls, and logical controls. Unit Lesson General Overview
  • 2. Information is an asset for organizations that exists in various forms (critical, propriety, intellectual, and digitized). Thus, securing the various forms of information are priorities for organizations. Laws such as the Fair Credit Reporting Act were created to help protect information from improper use, but such measures are insufficient in providing the level of protection needed to secure organizational information. Organizations use various tools and strategies to ensure information security (INFOSEC) which is the protection of “information assets and systems against any internal or external threat that might endanger them” (Ortmeier, 2013, p.135). INFOSEC risk assessments and analyses are conducted to identify the threats against organizational information that may exist and information protection strategies are implemented to protect against and respond to the identified threats. Protection strategies range from control strategies (discretionary access control, mandatory access control: hierarchical and non-hierarchical, operations security) to personnel security (information protection-related agreements) which includes information security legislation (e.g., National Security Decision Directive 298), classification systems for business information (e.g., sensitive compartmented information protocols),
  • 3. information security policies, and copyrights, patents, and trademarks. Communication security (COMSEC) is important for any information transmitted regardless of the medium (e.g., voice, electronic, impulses, microwave, etc.). Computer security is concerned with information accessible through computers. Maintaining computer security is a complicated task because information can be accessed locally and remotely through numerous means. The term cybercrime was coined to identify the crimes that are associated with using the internet to illegally gain access to information that is used in crimes (e.g., hacking, email wiretappings, phishing, and vishing). Thus one can image that one of the greatest challenges related to computer security is securing computer databases from internal and external threats. Government agencies have added issues of protection threats against their agencies and their personnel. To aid all organizations in maintaining computer Reading Assignment Chapter 6: Information, Communications, and Computer Security
  • 4. Learning Activities (Non-Graded) See information below. Key Terms Refer to the key terms within the textbook. BCJ 4385, Workplace Security 2 security various computer protection strategies are utilized (physical security, administrative controls, and logical controls: passwords, firewalls, malware). Research has suggested strategies for safeguarding sensitive computer information (e.g., Carroll’s 10 strategies) and the federal government has enacted legislation to research and develop cyber security measures (e.g., the Cyber Security Research and Development Act of 2002). Existing strategies and the continued development of future strategies are necessary to ensure that information, communication, and computer security is maintained in
  • 5. organizations. References: Ortmeier, P.J. (2013). Introduction to security: Operations and management (4th ed.). Upper Saddle River, NJ: Pearson. Questions to Consider 1. What types of information assets are used by organizations? 2. What types of information security tools and strategies do organizations use to secure their information assets? 3. What types of legislation has been enacted in the United States to assist with information security and what policies have resulted? 4. What is communication security? What is computer security? How are communication and computer security related? 5. What are the various types of cybercrime that exist? 6. What are the challenges associated with maintaining computer security? 7. What computer protection strategies and policies have been suggested and enacted?
  • 6. 8. What additional research and development is needed in the area of cyber security? Learning Activities (Non-Graded) 1. Think about the various organizations in your community that process a lot of information. Pick one organization and conduct an INFOSEC risk assessment and analysis. You can search the internet for ideas about what specific criteria are assessed, instructions about how the assessments and analyses are conducted, and examples of the finished product. Were there any identified risks that surprised you? Were there risks that you expected to find that you did not? 2. As a continuation of activity #1, brainstorm about the information protection strategies that you would utilize to protect the organization’s information assets. What control strategies would you use? What information security legislation is relevant and what related policies would you implement? How would you ensure personnel security associated with the organization’s information assets? 3. As a continuation of activity #2, select one of the current hacking
  • 7. examples and explore the computer protection strategies that were implemented, should have been implemented, and will need to be implemented in the future. Are any of Carroll’s 10 strategies applicable? What type of security research is needed and what types of strategies, policies and/or programs should be developed? Non-graded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information. Short Essay Questions: Answer three of the following questions. Each answer should be 2-3 paragraphs long. Answers are worth 10 points each. 1) Discuss the Persians. Who were they? What feats did they achieve within their empire that were the first in the western world? 2) What was the First International Period of Trade? When did it occur? Who was involved? What were they trading? 3) Discuss the Tale of the Eloquent Peasant. What insight does it offer into Egyptian society? What period of Egyptian history does this take place in and what concerns were present in society at the time? 4) Discuss the founding of the Spartan government as detailed in class. What is the type and structure of governance set forth and by whom? Who benefits from this style of rule and who is deprived? 5) Detail the unique nature of Jericho. Why was it considered the “Brewing Place for the Emergence of Civilization”?
  • 8. C) Fill in the Blank Questions: Provide the missing word/phrase for each of the following. Answers are worth 1 point per blank. Yes a few bonus points are possible in this section! 1) ____________ was used for the first time at the palace of Knossos on Crete to reinforce the structure. 2) The Hebrews constructed the Great Temple of Solomon around 960 BCE. The Temple housed the ___________. The Temple was destroyed by the __________ in the early 6th century BCE. King ________ agreed to help the Hebrews rebuild the Temple in exchange for military aid. 3) __________ was the mortuary temple of the great pharaoh Hatchepsut. 4) The Hymn to Aten represents a (perhaps unwanted) shift in religious practice for Egyptians toward a __________ society. 5) The ___________ are responsible for bringing iron technology and their _______ to the Greek speaking world.