You are on page 1of 3

Kingdom of Saudi Arabia

Ministry of Higher Education


Princess Noura bint Abdulrahman
University
College of Computer & Information Sciences
IS 533

Name:
ID:
Section:

Sheet #1

Q1- Describe the critical characteristics of information.


How are they used in the study of computer security?
Availability: Authorized users can access the information.
Accuracy: free from errors.
Authenticity: genuine.
Confidentiality: preventing disclosure to unauthorized individuals.
Integrity: whole and uncorrupted.
Utility: has a value for some purpose.
Possession: Ownership.
Q2- Identify the six components of an information system.
Which are most directly affected by the study of computer
security? Which are most commonly associated with its
study?
Software, Hardware, Data, People, Procedures and Networks.
All six of these components are impacted by the study of
computer security. A flaw or an oversight in any one of the areas
could lead to vulnerabilities or exposure. The components most
associated with the study of information security are, when viewed
as a science, hardware and software and when viewed as a social
science, people.

TA.Maha Al-kuaib & TA.Hussa Al-omran.

Kingdom of Saudi Arabia


Ministry of Higher Education
Princess Noura bint Abdulrahman
University
College of Computer & Information Sciences
IS 533

Q3- Who is ultimately responsible for the security of


information in the organization?
The Cheif Information Security Officer (CISO).
Q4- Matching:
Match each concept from column A to the definition
belongs to in column B:
A

1-Access

Information is authentic when it is the


information that was originally created,
placed, stored, or transferred.

2-Accuracy

Enables users who need to access


information to do

3-Authenticity

4-Confidentiality

The quality or state of preventing


disclosure or exposure to unauthorized
individuals or systems.
The quality or state of having value for

5-Utility

6-Integrity

7-Availability

some purpose or end.


The ability to use, manipulate, modify or
affect an
object.
An attribute of information in which the
data is free
of errors and has the value that the user
expects.
Ensures that the information is correct
and no unauthorized person or malicious
software has altered that data.

TA.Maha Al-kuaib & TA.Hussa Al-omran.

Kingdom of Saudi Arabia


Ministry of Higher Education
Princess Noura bint Abdulrahman
University
College of Computer & Information Sciences
IS 533

TA.Maha Al-kuaib & TA.Hussa Al-omran.

You might also like