MOD 1 Flashcards

1
Q

What are the core IA Terms (TVAC)?

A

Threat, Vulnerability, Attack, Control (TVAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a set of circumstance that can lead to loss or harm?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a weakness in the security system?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is exploiting a vulnerability?

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What counters a vulnerability?

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To attack, what 3 things are needed?

A

1) Method
2) Opportunity
3) Motive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the outer layer in the Layers of Defense in Depth?

A

Policies, Procedures, Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the inner layer in the Layers of Defense in Depth?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CIA stand for?

A

Confidentiality, Integrity, Avaliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which security goal focuses on secrecy and privacy?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which security goal focuses on precision, consistency, and usability?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security goal focuses on data/services received in a timely fashion?

A

Avaliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security goal supports identification and authentication?

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is like a username (claiming to be someone)

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is like a password (verifying who you are)

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authenticity and Non-Repudiation are essential for _________.

A

E-Commerce

17
Q

What is a crime involving a computer or aided by a computer?

A

Computer Crime

18
Q

What are examples of Computer Criminals?

A

disgruntled employees, hackerss, state-sponsored

19
Q

What is the possibility for harm to occur (Likelihood)?

A

Risk

20
Q

What are the 5 Risk Management methods?

A

1) Prevent
2) Deter
3) Deflect
4) Detect
5) Recover

21
Q

What is a broad statement?

A

Policy

22
Q

What are specific actions to be taken?

A

Procedures