CLO 1 Chapter 1 Flashcards

(25 cards)

1
Q

What is the primary mission of an information security program?

A

To ensure that information assets remain safe and useful.

Information assets include both the information itself and the systems that house them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the four important functions of information security for an organization.

A
  • Protecting the organization’s ability to function
  • Protecting the data and information the organization collects and uses
  • Enabling the safe operation of applications running on the organization’s IT systems
  • Safeguarding the organization’s technology assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three key aspects of information security?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Confidentiality in the context of the CIA Triad.

A

The ability to hide information from those people unauthorized to view it.

A breach in confidentiality allows unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Integrity in the context of the CIA Triad.

A

The ability to ensure that data is an accurate and unchanged representation of the original secure information.

A breach in integrity allows unauthorized modification of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Availability in the context of the CIA Triad.

A

The ability to ensure that the information concerned is always readily accessible to the authorized viewer.

A breach in availability means authorized users cannot access information when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the layers of security needed to implement security within an organization?

A
  • Physical security
  • Personnel security
  • Operations security
  • Communications security
  • Network security
  • Information security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the definition of Security?

A

The quality or state of being secure – to be free from danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the significance of the ARPANET in the history of computer security?

A

It was established by the US DoD and evolved into the Internet, highlighting the need for security due to distributed network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main focus of the first operating system designed with security as its primary goal?

A

The MULTICS system focused on user access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do organizations need to protect their information?

A

To fulfill their responsibility to stakeholders and maintain functionality, data integrity, and operational safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the sample security threats to Physical Security?

A
  • Fire
  • Theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the sample security threats to Personnel Security?

A
  • Angry employee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the sample security threats to Operations Security?

A
  • Flaw in operation logic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the sample security threats to Communications Security?

A
  • Weak encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the sample security threats to Network Security?

A
  • DoS attacks
  • Session hijacking
17
Q

What are the sample security threats to Information Security?

A
  • Theft of private data
18
Q

Fill in the blank: The three pillars of Information Security are __________.

A

Confidentiality, Integrity, Availability

19
Q

True or False: Security only involves protecting information from unauthorized access.

A

False

Security also involves ensuring data integrity and availability.

20
Q

What is a critical aspect of protecting data?

A

Securing data in transmission, processing, and at rest.

21
Q

What is needed to implement security within an organization?

A

Policy, awareness and training, and technology.

22
Q

What are the components of an Information System?

A
  • Data and information
  • Networks
  • Applications and written code
  • Physical devices
  • Rules and policies
  • Personnel
23
Q

What does a breach in confidentiality allow?

A

Unauthorized people to view information they shouldn’t be able to view.

24
Q

What does a breach in integrity allow?

A

Unauthorized people to change information they shouldn’t be able to modify.

25
What does a breach in availability mean?
Authorized people cannot access information when they need to.