Part 2 Flashcards Preview

Information Security Fundamentals > Part 2 > Flashcards

Flashcards in Part 2 Deck (33)
Loading flashcards...
0

Data ____ from Anywhere

Accessible

1

Many business professionals want ____ to data from anywhere they work, on a variety of ____

access, devices

2

To be ____, employees now request ____ to data and contact information on their laptops, desktops, home computers, and ____ devices

productive
access
mobile

3

Therefore, IT departments must now provide the ability to ____ data with numerous ____

sync, devices

4

And if the IT department can’t or won’t provide this ____, employees now have the power to ____

capability, take matters into their own hands.

5

______ can be accessed from both the home and office or anywhere there is an Internet connection.

online storage sites

6

Though it might be possible to block access to some of these sites, it is ____

not possible to block access to them all.

7

This ability to easily transfer data ____makes securing an organization’s data that much more difficult.

outside the control of a company

8

Security Isn’t About _____

Hardware and Software

9

Many businesses believe that if they purchase enough ____, they can create a ____

equipment, secure infrastructure.

10

Firewalls, intrusion detection systems, antivirus programs, and two-factor authentication products are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that_____

no product or combination of products will create a secure organiza- tion by itself.

11

Security is a ____; there is no tool that you can “____.”

process, set and forget

12

All security products are only ____

as secure as the people who configure and maintain them.

13

The employees tasked with maintaining the security devices should be provided with enough time, ____, and equip- ment to properly support the products.

training

14

The Bad Guys Are Very ____

Sophisticated

15

At one time the computer hacker was portrayed as a lone teenager with poor social skills who would break into systems, often for ____

nothing more than bragging rights.

16

As ecommerce has evolved, however, so has ____

the profile of the hacker.

17

Organized hacker groups have been formed to operate as ____.

businesses

18

_____ companies that work much like real-world companies are starting to appear and are steadily growing, thanks to the profits they turn.

Cybercrime

19

Now that organizations are being attacked by highly motivated and skilled groups of hackers, _____

creating a secure infrastructure is mandatory.

20

Management Sees Security as a ____

Drain on the Bottom Line

21

For most organizations, the cost of creating a strong security posture is seen as a ____, similar to pur- chasing insurance.

necessary evil

22

Organizations don’t want to spend the money on it,but the risks of not making the purchase ____.

outweigh the costs

23

The problem is exacerbated by the fact that IT professionals ____

speak a different language than management.

24

IT professionals are generally focused on ____, period. Management is focused on ____.

technology, revenue

25

Concepts such as profitability, asset depreciation, return on investment, realization, and total cost of ownership are the mainstays of management. These are ____ to most IT professionals.

alien concepts

26

Realistically speaking, though it would be helpful if management would take steps to learn some fundamentals of information technology, IT professionals should _____

take the initiative and learn some fundamental business concepts.

27

Learning these concepts is beneficial to the organization because the technical infrastructure can be implemented in a ____ manner, and they are beneficial from a ____ perspective for IT professionals.

cost-effective, career development

28

Strong security can be used to gain a ____ in the marketplace.

competitive advantage

29

Having secured systems that are accessible 24 hours a day, seven days a week means that an organization can reach and communicate with its clients and prospective clients more ____.

efficiently