Information Security Flashcards

(60 cards)

1
Q

The practice of protecting information by mitigating information risks.

A

INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A part of information risk management.

A

INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collection of data that has a meaning.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processed and organized data

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collecting, storing, and processing data for providing information, knowledge, and digital products

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection against unauthorized modification or destruction of information.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Free from unauthorized manipulation of the system; intentional or accidental.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protecting something; digital(VPN, Firewall, Router)/ physical(building).

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The quality or state of being secure—to be free from danger.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Raw and unprocessed data

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Character of information

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lowest point / form

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A must 100% security but not 100% at all because of users

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reducing or lessening the attack of malwares

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Isolate or minimize the damage

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It includes protection of the integriry, availability, authenticity, non-repudation and confidentiality of user data

A

information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is best thought of a superset of information security (i.e umbrella term), and as the business outcome of information risk management.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How factual./real, how true or accurate, something reliable

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Quantity or state of being whole, complete, and uncorrupted. The integiry of information is exposed to corruption, damage, destruction, or other disruption of its authentic state

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Adding something

A

Integrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Proving your identity by using passwords

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(Authenticity)The Quality of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, transferred.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Verify if the person accessing is the owner.
Authentication
26
Restricting access by keeping private
Confidentiality
27
Privacy or secrecy, private info guarding
Confidentiality
28
Preventing disclosure or exposure to unauthorized individuals or systems.
Confidentiality
29
The quality or state of preventing disclosure or exposure to unauthorized individuals or systems.
Confidentiality
30
It is addressed and sensitive data is protected by using a debit card with a PIN code. This PIN code makes sure that only authorized individuals will have access to financial account information.
CONFIDENTIALITY
31
 The access of restricted data  Providing something with proof  Ex. In the given system, changing the info in the system. They can trace who changed it by the student user ID.
NON-REPUDIATION
32
Keeping records of all ATM transfer and withdrawals in a user’s bank account; helps ensure that information is accurate and up-to-date.
integrity
33
Available for public use and accessible at all times. This provides convenience and flexibility for users.
Availability
34
CIA
Confidentiality, Integrity, Availability
35
IA
Information Assurance
36
ATM
Automated Teller Machine
37
PIN
Personal Identification Number
38
API
Application Programming Interface
39
CISO
Chief Information Security Officer
40
CTO
Chief Technology Officer
41
CRO
Chief Risk Officer
42
CSO
Chief Security Officer
43
- No hard fast rules nor many universally accepted complete solutions. - No manual for implementing security through entire system.
AS AN ART
44
- Dealing with technology designed to operate at high levels of performance. - Specific conditions cause virtually all actions that occur in computer systems. - Nearly every fault, security hole, and system malfunction are a result of interaction of specific hardware and software.
AS SCIENCE
45
- Social science examines the behavior of individuals interactions with systems. - Security begins and ends with the people that interact with the system. - Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles.
AS SOCIAL SCIENCE
46
Assigned for overall responsibility for information security
Executive Management
47
Responsible for design, implementation, management, and review of the organizations security policies.
INFORMATION SYSTEM SECURITY PROFESSIONALS
48
 System owners who have budgetary authority.
Data Owners
49
 Function that has “custody” of the system.
Data Custodians
50
Protect physical items
Physical Security
51
protect indicidual / group
Personal Security
52
protect the details of a parituclar operation
Operations Security
53
protect an organiztations communication, media technology and content
Communications Security
54
 The concept that individuals should have the right to own and have control over their data.  It emphasized the importance of autonomy over one’s information rather than leaving it in the hands of corporation or third parties.
Data Ownership
55
Individuals decide who can access their data and revoke access whenever they want.
Control
56
Having the right to know how your data is used.
Transparency
57
Shared data, corresponds to a reward for its value.
Compensation
58
- One of which is Cyder, empower users to take control their data. - Cyder is a browser extension that protects your privacy, blocking trackers, cookies, and ads.
Privacy Tools
59
- As technology advances, so does the need for better privacy laws, implementing privacy legislation sets standards and holds entities accountable for their privacy practices. - It must a. Set strict guidelines for data collection b. Give individuals greater control over their privacy, and c. Impose heavy fines on organizations that do not comply.
Privacy Legislation
60
- Decentralized – Shared information from one to another devices - Secured – Having uniqueness - Transparent – It is open for public use
Blockchain Technology