Chapter 1 Flashcards

(37 cards)

1
Q

Learning objective

A

Explain information systems security and its effect on people and businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Concepts

A
  • information systems security concepts
  • confidentiality, integrity, availability
  • 7 domains of an IT infrastructure
  • the weakest link in the security of an IT infrastructure
  • IT security policy framework and data classification standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Systems Security
- Internet -

A
  • Worldwide network with more than 2 billion users
    –> include governments, businesses, and organizations
  • Links communication networks to 1 another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Systems Security
- World Wide Web -

A
  • A system that defines how documents and resources are related across network machines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Breaches : Examples

A
  • Adobe Systems Incorporated, 2013 -
    –> Hackers published data for 150 million accounts
    –> stoles encrypted customer credit card data
    –> compromised login credentials
  • U.S. Office of Personnel Management, 2015 -
    –> Data breach impacted 22 million people
    –> stole SSNs, names, places of birth, addresses
    –> Millions must be monitored for identity theft for years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet of Things (IoT)

A

Connects personal devices, home devices, and vehicles to the Internet
- more data to steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersecurity

A

duty of every government that wants to ensure its national security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data security

A

the responsibility of every organization that needs to protect its information assets and sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

likelihood that something bad will happen to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat

A

any action that could damage an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability

A

a weakness that allows a threat to be realized or to have an effect on an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information system

A

hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information system security

A

the collection of activities that protect the information system and the data stored in it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

U.S. Compliance Laws Drive Need for Information Systems Security

A

CIPA/FERPA, FISMA, SOX, HIPAA, GLBA, PCI DSS (individual privacy data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Individual Privacy Data must be ______

A

protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Controls are required to protect ________ ________

17
Q

Tenets of Information Systems Security

A

Confidentiality, integrity, availability

18
Q

Confidentiality

A

only authorized users can view information

19
Q

Integrity

A

only authorized users can change information

20
Q

Availability

A

information is accessible by authorized users whenever they request the information

21
Q

Examples of Confidentiality

A
  1. Privacy data of individuals
  2. Intellectual property of businesses
  3. National security for countries + government
22
Q

Types of Security 4 Confidentiality

A
  1. Cryptography
  2. Encryption
  3. Ciphertext
23
Q

Cryptography

A

practice of hiding data and keeping it away from unauthorized users

24
Q

Encryption

A

the process of transforming data from cleartext into ciphertext

25
Ciphertext
the scrambled data that are the result of encrypting cleartext
26
Encryption of Cleartext into Ciphertext (VPN Tunnel)
VPN Tunnel with Encryption IP Datagram is Encrypted Cleartext Not Visible
27
Integrity
maintain valid, uncorrupted, and accurate information
28
Database has integrity if:
1. data is not altered 2. data is valid 3. data is accurate
29
Availability (Information security)
the amount of time users can use a system, application, and data
30
Availability Time Measurements
1. Uptime 2. Downtime 3. Availability [ A = (total uptime)(total uptime + total downtime)] 4. Mean time to failure (MTTF) 5. Mean time to repair (MTTR) 6. Mean time between failures (MTBF) 7. Recovery time objective (RTO)
31
Uptime
the total amount of time that a system, application, and data are accessible. Typically measured in units of seconds, minutes, and hours within a given calendar month. Often expressed as a percentage of time available, e.g., 99.5 percent uptime.
32
Downtime
the total amount of time that a system, application, and data are not accessible. Measured in units of seconds, minutes, and hours for a calendar month.
33
Availability [ A = (total uptime)(total uptime + total downtime)]
A mathematical calculation where A = (Total Uptime) / (Total Uptime + Total Downtime).
34
Mean time to failure (MTTF)
the average amount of time between failures for a particular system
35
Mean time to repair (MTTR)
the average amount of time it takes to repair a system, application, or component. The goal is to bring the system back quickly
36
Mean time between failures (MTBF)
the predicted amount of time between failures of an IT system during operation.
37
Recovery time objective (RTO)
the amount of time it takes to recover and make a system, application, and data available for use after an outage.