Information Systems Security - Study Guide
Information Systems Security - Study Guide

Information Systems Security - Study Guide

Source: Pressbooks

Student Price: Free with Top Hat Pro Subscription

A study guide on the security of information systems.

This content is licensed under the Creative Commons Attribution 3.0 Unported License.

Information Systems Security - Study Guide

​Learning Objectives

  • Identify the information security triad
  • Identify and understand the high-level concepts surrounding information security tools
  • Secure yourself digitally

Briefly define each of the three members of the information security triad.


What does the term authentication mean?


What is multi-factor authentication?


What is role-based access control?


What is the purpose of encryption?


What are two good examples of a complex password?


What is pretexting?


What are the components of a good backup plan?


What is a firewall?


What does the term physical security mean?


Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication.


What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two- to three-page paper that describes at least two new advances in encryption technology.


What is the password policy at your place of employment or study? Do you have to change passwords every so often? What are the minimum requirements for a password?


When was the last time you backed up your data? What method did you use? In one to two pages, describe a method for backing up your data.


Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

​Information Systems for Business and Beyond © 2014 David T. Bourgeois, is licensed under a Creative Commons Attribution (CC BY) license made possible by funding from The Saylor Foundation’s Open Textbook Challenge.

​​Creative Commons License