Skip to main content
Workforce LibreTexts

6.10: Study Questions

  • Page ID
    22758
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    Study Question \(\PageIndex{1}\)

    Briefly define the three components of the information security triad.

    Answer

    Confidentiality, integrity, and availability.

     

    Study Question \(\PageIndex{2}\)

    Explain what authentication means.

    Answer

    Confirming the identity of a user through something they know, have, or are before allowing access.

    Study Question \(\PageIndex{3}\)

    Give two examples of a complex password.

    Answer

    Passwords with 8+ characters, uppercase/lowercase letters, numbers, and special characters.

     

    Study Question \(\PageIndex{4}\)

    Give three examples of threat actors.

    Answer

    Hacktivists, cyber criminals, nation-states.

     

    Study Question \(\PageIndex{5}\)

    Name two motivations of hacktivists to commit cybercrime.

    Answer

    Politics, social causes.

     

    Study Question \(\PageIndex{6}\)

    List five ways to defend against cyber attacks.

    Answer

    Firewalls, encryption, access controls, security policies, awareness training.

     

    Study Question \(\PageIndex{7}\)

    List three examples of PII.

    Answer

    Social Security Number, driver's license, bank account numbers.

    Study Question \(\PageIndex{8}\)

    Briefly explain the role of SOC.

    Answer

    Security operations center monitors threats, analyzes events, and responds to incidents.

    Study Question \(\PageIndex{9}\)

    Explain the purpose of security policies.

    Answer

    Provide rules and guidelines for employee security practices.

     

    Study Questions \(\PageIndex{10}\)

    Explain how information availability related to a successful organization.

    Answer

    High availability of systems and data is required for most business operations.

    Study Question \(\PageIndex{11}\)

    What are some ways mobile devices and remote work create security challenges for businesses?

    Answer

    Mobile devices can expose data if lost/stolen. Remote work requires secure remote access tools.

     

    Study Question \(\PageIndex{12}\)

    What is social engineering and what are some examples?

    Answer

    Tricking people to release info or compromise security. Phishing, pretexting. 

     

     

    Study Question \(\PageIndex{13}\)

    Why is training employees on security best practices important?

    Answer

    Employees cause many breaches via errors or social engineering.

    Study Question \(\PageIndex{14}\)

    What are some regulations like GDPR that businesses must comply with regarding data security and privacy?

    Answer

    GDPR, HIPAA, PCI DSS, CCPA.

    Study Question \(\PageIndex{15}\)

    What was the impact of the GDPR regulation on Google and other US companies?

    Answer

    Google fined $57M. Cost US companies millions to implement.

     

     

    Exercises

    1. Research and analyze cybersecurity incidents to come up with scenarios of how organizations can prevent an attack.
    2. Discuss some IoT (Internet of Things) application vulnerabilities with non-techie and techie technology users, then compare and contrast their different perspectives and reactions to IoT vulnerabilities.
    3. Describe one multi-factor authentication method that you have experienced and discuss the pros and cons of using multi-factor authentication.
    4. Identify the password policy at your place of employment or study. Assess if it is a good policy or not. Explain.
    5. Take inventory of possible security threats that your home devices may be exposed to. List them and discuss their potential effects and what you plan to do about them.
    6. Recall when you last back up your data. Discuss the method you use. Define a backup policy for your home devices.
    7. Research the career of a SOC professional. Report what certificate training it requires to become SOC professionals, what the demand is for this career, and their salary range.
    8. Describe a time you experienced a possible security threat or breach. How did you respond and what was the outcome?
    9. What security best practices have you implemented for mobile devices you use for work or home?
    10. Share an example of a company that you feel demonstrates a strong security culture. What makes their security culture effective?

    This page titled 6.10: Study Questions is shared under a CC BY 3.0 license and was authored, remixed, and/or curated by Ly-Huong T. Pham and Tejal Desai-Naik (Evergreen Valley College) .

    • Was this article helpful?