Chapter 1 Flashcards

(30 cards)

1
Q

Computer Security

A

This term specified the need to secure the physical location of computer technology from outside threats. This term later came to represent all actions taken to preserve computer systems from losses. It has evolved into the current concept of information security as the scope of protecting information in an organization has expanded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

C.I.A Triad

A

The industry standard for computer security since the development of the mainframe. The standard is based on three characteristics that describe the utility of information: Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Communications security

A

The protection of all communications media, technology, and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Security

A

Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Security

A

A subset of communications security; the protections of voice and data networking components, connections, and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security

A

A state of being secure and free from danger or harm. Also, the actions taken to make someone or something secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accuracy

A

How data is free of errors and has the value that the user expects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authenticity

A

How data is genuine or original rather than reproduced or fabricated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability

A

How data is accessible and correctly formatted for use without interference or obstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

How data is protected from disclosure or exposure to unauthorized individuals or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

How data is whole, complete, and uncorrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personally Identifiable Information

A

A set of information that could uniquely identify an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Possession

A

How the data’s ownership or control is legitimate or authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Utility

A

How data has value or usefulness for an end purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

McCumber Cube

A

A graphical representation of the architectural approach widely used in computer and information security; commonly shown as a cube composed of 3x3x3 cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information System

A

The entire set of software, hardware, data, people, procedures, and networks that enable the use of information resources in the organization

17
Q

Physical Security

A

The protection of physical items, objects, or areas from unauthorized access and misuse

18
Q

Bottom-up Approach

A

A method of establishing security policies and/or practices that beings as a grassroots effort in which systems administrators attempt to improve the security of their systems

19
Q

Top-down Approach

A

A methodology of establishing security policies and/or practices that is initiated by upper management

20
Q

Systems Development Life Cycle

A

A methodology for the design and implementation of an information system.

21
Q

Methodology

A

A formal approach to solving a problem based on a structured sequence of procedures

22
Q

Waterfall Model

A

SDLC in which each phase of the process “flows from” the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments

23
Q

Software Assurance

A

A methodological approach to the development of software that seeks to build security into the development life cycle rather than address it at later stages. SA attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that user can deploy with confidence.

24
Q

Chief Information Officer

A

An executive level position that oversees the organization’s computing technology and strives to create efficiency in the processing and access of the organizations information

25
Chief Information Security Officer
Typically considered the top information security officer in an organization. The CISO is usually not an executive level position, and frequently the person in the role reports to the CIO
26
Project Team
A small functional team of people who are experienced in one of multiple facets of the required technical and nontechnical areas for the project to which they are assigned
27
Data Custodians
Individuals who work directly with data owners and are responsible for storage, maintenance, and protection of information
28
Data Owners
Individuals who control, and are therefore responsible for, the security and use of a particular set of information. They are ultimately responsible for this information
29
Data Users
Internal and external stakeholders (customers, suppliers, and employees) who interact with information in support of their organizations planning and operations
30
Community of Interest
A group of individuals who are united by similar interest or values within an organization and who share a common goal of helping the organization to meet its objectives