G Saunders' Home Page
Study Questions for: Professional & Security Standards
Describe Prism, Upstream, the NSA's Data Centers, and how they're used.
From your quick study of most dangerous software errors, critical security controls, and server hardening tips: Describe the top three threats to information security and how to mitigate them.
Name and discuss the pillars of information security that make up this acronymn: CIAAN.
Define 'protection' in information systems as it was presented in class, Protection = ? + (?? + ???). Name each of the terms that replace the ?marks, and give an activity associated with it.
Describe B2B networking. Use and describe each of these terms in your description: EDI, X12, HTTP, SSL, Trading Partners, Public Keys.
Sketch and label the 'trilogy of trilogies' that thoroughly describes information security. Summarize it in a few sentences.
Name and briefly describe at least the 4 Threat Vectors discussed in class.
Expand the acronymn and briefly characterize each/some/any of these standards: GES, COBIT, ITIL, SOX, PCI, EDI, X12, HIPAA.