Information Assurance
Information Assurance
Information Assurance
-Information
security protects sensitive information from
unauthorized activities, including inspection, modification, recording
and any disruption or destruction. The goal is to ensure the safety
and privacy of critical data such as customer.
Pros
1. Being in Demand – Cyber security is certainly in demand.
2. Good Salaries - Cyber security professionals are generally
well paid once their careers are established
3. Opportunity to Learn New Things - Almost all of the
cyber security professionals we talked to love their work,
and specifically love that they can support their family
well and do so by doing work that they find interesting.
Cons
1. On-Call and Demanding Hours - A cyber security attack is
a critical problem, and unfortunately can happen at any
time
2. Job Pressure. - because of the constant nature of the
possibility of a hack or an attack.
3. The Learning Treadmill Never Stops - This is both a
blessing and a curse, since it can provide new and
interesting things to learn and it weeds out those that do
not keep
Lab 2
1.
2.
2 3
3.
4.
1. Equity securities
2. Debt securities
Debt securities differ from equity securities in an important way; they involve
borrowed money and the selling of a security. They are issued by an
individual, company, or government and sold to another party for a certain
amount, with a promise of repayment plus interest. They include a fixed
amount (that must be repaid), a specified rate of interest, and a maturity date
(the date when the total amount of the security must be paid by)
3. Derivatives
3. Give at least 2 examples of famous computer virues along with detailed history
Intergrity – Data are trustworthy, complete, and have not been accidentally
altered or modified by an unauthorized user.
3. I love you – is an overwrite virus. This virus disguised itself as a love letter from
one of its victims contacts and spread via email. It was the most damaging
malware event of all time when it occurred 2000, in just about 10 days, it reached
estimated 45 million users and and caused $10 billion in damages
Worm – Is a type of Trojan horse malware that unlike traditional viruses, does
not require the user’s intervention to spread form device to device. After
breaching a system, it can spread form one computer to another without human
intervention
Lab 4
Give at least 1 example of news with detailed summary related to the following:
1. Security risk
2. Environmental Risk
3. Political Risk
4. Medical Risk
5. Infrastructure Risk
Political Risk - Wal-Mart Stores Inc. outlined certain political risks it faces in its
fiscal 2015 10-K filing with the SEC under its operating risk section. In its risks
associated with suppliers, Wal-Mart mentioned potential political and economic
instability in the countries that foreign suppliers operate, labor problems, and
foreign trade policies and tariffs that could be imposed.
Medical Risk – Lower blood pressure, cholesterol, and blood glucose. The
researchers found clear evidence that, compared with lower-intensity behavioral
weight management programs or no weight loss support, behavioral weight
management programs resulted in lower systolic blood pressure, lower total
cholesterol-to-good cholesterol ratio, and lower HbA1c (a measure of blood
sugar levels over the previous 3 months)
Infrastructure Risk - The risk assessment of a project should reflect its credit quality
during its weakest period until the obligation is repaid through project cash flows.
Separation of the construction and operation phases enables a risk assessment to
identify if the weakest period is during one phase or the other.
Lab 5
2. On the Second Video, do you think should be thankful for this or not? If so, why?
1.
Application Security
Data loss prevention
Forensics
Incident Response
Network Security
Security architecture
Threat Intelligence
Vulberability Management
2.
Lab 6
2. Give at least 3 CYBERNEWS that relates on the cybersecurity and information security
3. I will talk to them to stop/warning what they’re doing and if they didn’t stop I
will report them to authority
LAB 7
1. What are the legal and regulatory compliance in regards to the ff:
A. CYBERSECURITY
B. INFORMATION SECURITY
2. In Relation to the video, “ the MALWARE that hacked Linus Tech Tips” What tips and tricks in
order to avoid this kind of situation
A. Cyber laws, more commonly known as internet laws, are laws that are related
to legal informatics, regulating the digital distribution of information, e-
commerce, software, and information security. It usually covers many related
areas, such as usage and access to the Internet, freedom of speech, and
privacy.
B. Securing information is about securing value. In the same way that we secure
physical stores of value such as cash, gold, or jewelery against theft, loss, or
destruction, we must do the same with digital stores of value – particularly
information. We live in an information society, after all, where the creation, use,
and distribution of information is a significant economic, political, and cultural
activity. We are moving from the service economy into the information economy,
which emphasizes informational activities that rely on information technologies
such as computers, mobile devices, and the Internet.
2. always double check the name of the shop and avoid the suspicious site or email