Professional Documents
Culture Documents
LUMABA, MARY JA Office
LUMABA, MARY JA Office
BSINT III
1. What is security?
Answer: Security is essential to safeguard your computer against trespasser from using your personal or
office based computer resources with malicious intent.
2. How can you apply the information assurance and security to your course?
Answer: Information assurance and security is applicable to my course in a way that it helps me to know
how to protect computer system and network from theft. Secure hardware and software from
unauthorized intrusions. Learning this topics enables for me to be more vigilant and it prepares us for
incoming cyber attacks that may alter, distroy and misuse our data.
ACCESS- is a security that can be used to regulate who or what can view or use resources in a computing
environment.
ATTACK- Gaining the access of data it's either accessing data, modifying data or destroying the data by
unauthorized users.
EXPLOIT- is a piece of software, data or sequence of commands that can exploit a vulnerability for
malicious purposes.
PROTECTION PROFILE OR SECURITY POSTURE- the measures of the level of visibility you have into your
asset inventory and attack surface.