BEC 4.3 Flashcards

Security

1
Q

Why is it important to safeguard files and records?

A

Inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

Using a password or a digital key to scramble a readable (plaintext) message into an unreadable (ciphertext message).
The intended recipient of the message then uses either the same or another digital key (depending on the encyrption method) to conver the ciphertext message back into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What characteristics should a password management policy address?

A
  1. Password length: longer the better. Should be greater than seven characters. Many organizations standardize on eight characters
  2. Password complexity: features 3 of the following 4 characteristics: uppercase, lowercase, numeric, and ASCII characters (e.g., ! @ # $ % ^ & * or ?)
  3. Password age: National Security Agency (NSA) recommends that passwords be changed every 90 days. Administrative passwords should be changed more frequently
  4. Password reuse: The NSA recommends that password reuse of the previous 24 passwords be restricted. The goal is to prevent users from alternating between their favorite two or three passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 types of computer securities policies?

A
  1. Program-level policy
  2. Program-framework policy
  3. Issue-specific policy
  4. System-specific policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distinguish between digital signatures and e-signatures

A

Digital signatures - use asymmetric encryption to create legally binding electronic documents.

Web-based e-signatures are an alternative mechanism for accomplishing same objective.

An e-signature is a cursive-style imprint of a person’s name that is applied to an electronic document and is also considered legally binding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What defines an information security policy?

A

States how an organization plans to protect its tangible and intangible information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly