1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data.
2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ...view middle of the document...
7. Make sure to always be aware of your surroundings, that other people are not spying on you. Be careful when you are putting in passwords or looking at sensitive information.
8. The classic perception of the hacker is frequently glamorized in fictional accounts as someone who stealthily manipulates through a maze of computer networks, systems, and data to find the information that resolves the dilemma posed in the plot and saves the day. However, in the world of reality, a hacker frequently spends long hours examining the types and structures of the targeted systems because he or she has to use skill, guile, or fraud to attempt to bypass the controls placed around information that is the property of someone else. The perception of a hacker has evolved over the years from a person who has expert knowledge of computer systems to one who uses this knowledge to manipulate information systems through deliberate attacks with malicious intent. The profile of a current hacker is male or female, age 12-60, with varying technical levels, and can be internal or external to the organization. Today there are both expert hackers and unskilled hackers. The expert hackers are the ones who create the software and schemes to attack computer systems and the novice hacker is the one who usually implements the schemes created by the expert hacker. This is the reason that the profile range for a hacker has increased to include more people of varying skill levels and backgrounds.
9. A skilled hacker has the knowledge he/she needs to crack any code, firmware, firewall, etc, to gain access into other peoples systems for malicious intent. An unskilled hacker does not have those skills to do any of that. A “noob” hacker would require a lower security level than their skilled counterparts due to the fact there is a huge lack of experience between the two.
10. Malware software components are designed to damage, destroy or deny service to targeted systems. Types include viruses, worms, Trojan horses, DOS attacks, logic bombs and back doors. Worms differ from viruses in that they do not require a host file to replicate. Worms will usually utilize flaws in a network to spread. Viruses may utilize a Trojan horse as a host to disguise themselves for penetrating s system. The user will generally aid the Trojan/virus by initiating the executable.