IS3340 CHAPTER 1 Flashcards
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind is called ___?
ADMINISTRATIVE CONTROL
Availability, Integrity, Confidentiality – goals of information security is called ___?
A-I-C TRIAD
Any person or program that attempts to interact with a computer information system in an unauthorized manner is called ___?
ATTACKER
Any person or program that possesses permission to access a resource is called ___?
AUTHORIZED USER
The assurance that requested information is available to authorized uses upon request is called?
AVAILABILITY
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions is called ___?
COMPUTER ENVIRONMENT
The assurance that information can only be accessed and viewed by authorized users is called ___?
CONFIDENTIALITY
A control that repairs the effects of damage from an attack. This includes virus removal procedures, firewall table updates, and user authorization database updates and is called ___?
CORRECTIVE CONTROL
A security strategy that relies on multiple layers of security that require attackers to defeat multiple controls to access any protected resource is called ___?
DEFENSE IN DEPTH
A control that detects when an action has occurred. This includes smoke detectors, log monitors, and system audits and is called ___?
DETECTIVE CONTROL
An agreement between the software producer and the end user. It addresses issues regarding approved use and liability. This is called ___?
END USER LICENSE AGREEMENT (EULA)
The practice of ensuring electronic information is safe from unauthorized use and accessible for authorized use is called ___?
INFORMATION SYSTEMS SECURITY
The assurance that information can be modified only by authorized users is called ___?
INTEGRITY
An alternate term for technical control is called ___?
LOGICAL CONTROL
Software that is designed to infiltrate a target computer and make it do something the attacker has instructed it to do is called ___?
MALICIOUS SOFTWARE
A device that limits access or otherwise protects a resource, such as a fence, door, lock, or fire extinguisher is called ___?
PHYSICAL CONTROL
A control that stops an action before it occurs and includes locked doors, firewall rules, and user passwords is called ___?
PREVENTATIVE CONTROL
Any exposure to a threat is called a ___?
RISK
A mechanism used to protect information and related assets is called ___?
SECURITY CONTROL
A device or process that limits access to a resource. Examples would be user authentication, antivirus software, and firewalls. This is called ___?
TECHNICAL CONTROL
Any action that could lead to damage or loss is called ___?
THREAT
Any person or program that does not possess permission to access a resource is called ___?
UNAUTHORIZED USER
Any weakness that could allow a threat to be realized is called ___?
VULNERABILITY
Standalone malicious software programs that actively transmit themselves, generally over networks, to infect other computers is called ___?
WORMS