Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Name the 5 Principles of Information Assurance.

Name:

Institution:

Course:

Tutor:

Date:

Q1). Name the 5 Principles of Information Assurance.

The five principles of information assurance include Confidentiality, integrity, non-repudiation, availability of information as well as authentication.

Q2). Briefly describe each of the five principles named above in question #1.

Firstly, data integrity is an information assurance principle that ensures the accuracy of information being conveyed. Such information should therefore be free from incorrect changes that may be intentionally or otherwise effected. Confidentiality of information on the other hand requires that the information being conveyed through a communication channel be available only to the authorized parties in the system. No outsider should get access to the information. Thirdly, Authenticity of information is a fundamental security measure that requires genuineness of parties in the communication system, transaction process as well as the documents used. Availability of information is another information assurance principle that ensures data or systems are available when needed. Finally, non-repudiation is an information assurance principle requiring all the parties in a communication system to honor the contract (Denning et al, 2).

Q3). Information Assurance involves many areas, identify five.

Information assurance covers a variety of information security areas including security of network, security of the operation systems, detection of intrusion, information sharing as well as storage security among other security measures.

Q4). Define information security.

Generally, in formation security involves the protection of data against unauthorized access. According to McDonald (94) information security entails the technical and administrative measures as well as techniques and concepts adopted to protect data from unauthorized use, acquisition, manipulation or damage, disclosure, modification or loss of such information assets (Denning et al, 1).

Q5). When was the Internet ‘born?’

Internet was established as ARPANET on the twenty first day of November in 1969. ARPANET thereafter grew to the internet.

Q6).What was the original purpose of the Internet?

The original; purpose of the internet was to maintain communication and exchange of raw data especially in times of war.

Q7). What is TCP/IP?

TCP refers to the transmission control protocol (TCP) and internet protocols (IP) are standards and procedures used in the internet and are meant to connect different networks. They are the basic language of the internet

Q8). What do you call a program that spreads itself by altering other programs to include a copy of itself?

It is referred to as Virus.

Q9). What is a Trojan Horse?

Trojan Horse is a malicious program that may masquerade as a different trusted program.

Q10). How does a worm spread? Provide a real-world example.

Computer worm is a self-replicating malicious program that sends copies of itself to the other end of the computer network. Worm does not require an attachment program but instead replicates and sends copies of itself to the nodes of the other computer in the network given the security lapse in the targeted computer. For instance, a malicious e-mail that promises free access to sex movies has been reported across networks in the recent past. It gains access to one’s computer without your intervention.

Q11). Describe a blended attack.

When the characteristics of viruses are merged with those of the computer worms then a blended attack is reported. In such situation, the malicious program may require an attachment program so as to enhance its spread as seen in a virus or may spread through self-replication followed by sending of its copies to other computers as seen in worms.

Q12). What are strong/complex passwords and why are they important?

Strong passwords are those that have at least six characters that are arranged in a random manner and constitutes of upper and lower cases as well as numbers and special characters. Moreover, the password should not be a dictionary word. The aforementioned conditions are meant to protect the information that would be accessed using such password.

Q13). What is Biometrics? Give an example of usage.

Biometrics is a computer security concept referring to authentication methods that rely on measurable physical features that can be verified automatically. Biometrics may be used in e-commerce transactions where verification of identity through fingerprinting may be required.

Q14). What is the purpose of a Firewall?

The main purpose of a firewall is to control traffic from both inside and outside a specified network.

Q15). What is a key purpose for a business security policy?

A business security policy has the important role of providing awareness as well as legal protection to all the parties the business.

Q16). There are many types of security threats. List three.

The types of security threats include: Identity theft, malicious acts such as online fraud as well as hacking.

Q17). According to many surveys, what is the greatest security risk?

The greatest security risk involves internal cyber attacks which are soaring day by day in many parts of the world.

Q18). What is the generally accepted difference between cracking and hacking?

Hacking involves the use of one’s proficiency in computer programming to pursue certain goals without violating any legal rules. Cracking on the other hand involves the use of such knowledge of computer systems to realize personal gains such as stealing of data or getting access to bank accounts (Denning et al, 2).

Q19). What is a denial of service (DoS) attack?

Denial of service attack is any malicious act that disrupts the normal service within a network.

Q20). In your opinion what is the biggest security threat today and what can be done about it?

Cyber attacks pose greatest threat to the security than any other issue. In order to avert such crimes, both the federal government as well as business ventures should adopt a strong and flexible defense mechanism against such vice. Moreover, organizations should not only attract highly qualified employees but also develop skills through internal training so as to curb the vice. More importantly, a comprehensive training on computer forensics as well as early crime detection system should be established and improved given the consistent changes in technologies.

Work cited:

Denning et al. Internet Besieged – Countering Cyberspace Scofflaws. 1998. ACM Press.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.