5.1 Flashcards
(43 cards)
What are the components of The information system
Procedures, people, hardware, networks, software, data.
____________ is protecting information and information systems from unauthorized access use, disclosure, disruption modification or destruction
Information security
This component of the IS has increased the necessity of information security…
Networks
Out off all the component of IS, They are considered the weakest link in an organization’s security program…
People
This component of IS is considered the most difficult to secure..
Software
This component of IS is considered the most valuable to an organization and the main target for intentional attacks..
Data
_______ consists of facts and figures that are stored, processed, or transmitted in or out by the information system….
Data
This component of the Is is considered as physical assets which must be protected from harm, theft…..
Hardware
What are the main goals of Information security?
Confidentiality , integrity, and availability.
What are the types of protections?
Physical protection, awareness-based protection, technical protection
The hardware component of Is requires which kind of protection?
Physical protection
The people and procedures require which land of protection?
Awarness-based protection
Software, data, and networks require which kind of protection?
Technical protection
Cryptography, firewalls, access control systems are all examples of….
Security technologies
The main goals of information security are also commonly known as _________.
CIA triad
A ________ is one of the main concerns in information security.
Security attack
What are the main two types of security attacks?
insider attack, external attack
Insider and external attacks can be further classified into four categories: modification attack, fabrication attack, _________ attack, and _________ attacks
interception, interruption
which security attacks affects confidentiality?
interception
which security attacks affect integrity and availability?
interruption attacks, fabrication attacks, and modification attacks.
_______ attacks allow an attacker to gain access to sensitive information.
interception
_______ attacks allow an attack to make sensitive information unusable or unavailable to authorized users.
interruption
________ attacks allow an attacker to tamper with sensitive information.
modification
________ attacks is the type of attack in which the attackers inserts forged objects or information into the system, as if it was generated by an authorized user.
fabrication