IS4550 CHAPTER 1 Flashcards
The process of determining the identity of an individual or device is called ___.
AUTHENTICATION
Ensuring accessibility of information to authorized users when required is called ___.
AVAILABILITY
A management technique used to improve the efficiency and effectiveness of a process within an organization is called ___.
BUSINESS PROCESS REENGINEERING (BPR)
Limiting access to information/data to authorized users only is called ___.
CONFIDENTIALITY
An ad hoc, ongoing effort to improve business products, services, or process is called ___.
CONTINUOUS IMPROVEMENT
The state of data stored on any type of media is called ___.
DATA AT REST
The state of data when traveling over or through a network is called ___..
DATA IN TRANSIT
The act of managing implementation and compliance with organizational policies is called ___.
GOVERNANCE
The parameters within which a policy, standard, or procedure recommended when possible but are optional is called ___.
GUIDELINE
The implementation of controls designed to ensure confidentiality, integrity, availability, and non-repudiation is called ___.
INFORMATION ASSURANCE
The act of protecting information systems or IT infrastructures from unauthorized use, access, disruption, or destruction is called ___.
INFORMATION SYSTEMS SECURITY (ISS)
The five-phase management process of controlling the planning, implementation, evaluation, and maintenance of information systems security is called ___.
INFORMATION SYSTEMS SECURITY MANAGEMENT LIFE CYCLE
The act of ensuring that information has not been improperly changed is called ___.
INTEGRITY
A principle that restricts information access to only those users with an approved and valid requirement is called ___.
NEED TO KNOW
The concept of applying technology in way that an individual cannot deny or dispute they were part of a transaction is called ___.
NONREPUDIATION
A document that states how the organization is to perform and conduct business functions and transactions with a desired outcome is called ___.
POLICY
A structure for organizing policies, standards, procedures, and guidelines is called ___.
POLICY FRAMEWORK
A written statement describing the steps required to implement a process is called ___.
PROCEDURE
A set of policies that establish how an organization secures its facilities and IT infrastructure. It can also address how the organization meets regulatory requirements is called ___.
SECURITY POLICIES
The portion of a service contract that formally defines the level of service. These agreements are typical in telecommunications contracts for voice and data transmission circuits is called ___.
SERVICE LEVEL AGREEMENT (SLA)
An established and proven norm or method. The can be a procedural or technical ___ implemented organization-wide.
STANDARD
- What is the issue in the following? John works in the accounting dept. but travels to other company locations. He must present the past quarter’s figures to the CEO in the morning. He forgot to update the Power Point presentation on his desktop computer at the main office.
- Unauthorized access to the system
- Integrity of the data
- Availability of the data
- Nonrepudiation of the data
- Unauthorized use of the system
Availability of the data
- Governance is the practice of ensuring an entity is in conformance to policies, regulations, ___, and procedures.
Standards
- COBIT is a widely accepted international best practices policy framework.
TRUE OR FALSE
True