Chapter 1 Flashcards

1
Q

Define “Information security”:

A

Knowing and making sure that information
risks and controls are in balance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the “Enigma” machine?

A
  • A German made decryption machine that was used in WW2; it helped in the advancement of information security.
  • First broken by the poles.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s “Arpanet”, and who developed it?

A
  • The first Internet.
  • It was developed by Larry Roberts in the US.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s “RAND Report R-609”?

A

A report that highlighted the vulnerabilities in computer systems and the need for security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s “MULTICS”?

A

First operating system created with security as its primary goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s “DEFCON”?

A

The first information security conference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does C.I.A stand for:

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the difference between “subject of an attack” and “object of an attack”?

A
  • “Subject of an attack” is the computer that is being used as an active tool to conduct attack.
  • “Object of an attack” is the computer or the entity that is being attacked.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define the following concepts:
1 - Access.
2 - Asset.
3 - Attack.
4 - Exploit.
5 - Exposure.

A

1 - The ability to use, manipulate, or affect something.
2 - A resource that is being protected.
3 - An act that can damage or compromise information and the systems supporting it.
4 - A technique used to compromise a system.
5 - A condition or state of being exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define the following concepts:
1 - Loss.
2 - Risk.
3 - Threat.
4 - Threat Agent.
5 - Vulnerability.

A

1 - The damage of an asset.
2 - The probability of an unwanted occurrence.
3 - An entity that is a danger to an asset.
4 - A component of a threat.
5 - Weakness in a system that exposes information to damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the 2 information security implementations?

A

1 - Bottom-Up Approach
- Doesn’t work most of the time.
- Key advantage: technical expertise of individual administrators.

2 - Top-Down Approach
- Initiated by upper management: Issue policy, procedures, and processes…
- Most successful and involves (SDLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s “Systems Development Life Cycle (SDLC)” and it’s steps?

A

Is a methodology for implementation of an information system within an organization.

1- Investigation:
Objectives, constraints, and scope of project are specified.

2- Analysis:
determining what the new system will do and how it will interact with the existing systems.

3- Logical design:
begin creating the solution for the problem.

4- Physical design:
the logical design is transformed into a physical system, and specific hardware and software components is selected and planned.

5- Implementation:
Installation of hardware and software onto production computers, and integration of the system into work process.

6- Maintenance & change: Longest and most expensive phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Owner vs Data Custodian vs Data User:

A

Data Owner: responsible for the security and use of a particular set of information.

Data Custodian: responsible for storage, maintenance, and protection of information.

Data Users: end users who work with information to perform their daily jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly