Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

(1 pt.) As it relates to information security, match the correct term to the cor

ID: 3706411 • Letter: #

Question

(1 pt.) As it relates to information security, match the correct term to the corresponding ways information security is achieved A. - Confidentiality Integrity C Accountability Availability File change monitoring B. Backups Authentication, Event logging Encryption, Need to know policy QUESTION 5 (1 pt) Match the reasons for the failure of the following computerized systems Patriot missile AT&T; long distance network Therac-25 machine Bad line of code Mismatch of data input units Software race condition, re-use of software Error in storage of a data value, re-use of software YMARS climate orbiter

Explanation / Answer

Q1.

Confidentiality is access restricted to those authorized to view the data in question.

Integrity maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. Backups or redundancies must be available to restore the affected data to its correct state.

Accountability is an essential part of an information security plan. An example is apolicy statement that all employees must avoid installing outside software on a company-owned information infrastructure.

Availability is ensure maintaining all hardware, performing hardware repairs needed and maintaining a correctly functioning operating system environment that is free of software conflicts. It also keep current with all necessary system upgrades.

Q2.

The AT&T Long Distance Network faulty software was installed on the toll tandems throughout the network. The software glitch managed to disable many switches throughout the network until the problem was attributed to the faulty software and a previous version was installed.

The primary reason attributed to the bad software design and development practices, and not explicitly to several coding errors that were found.