Principles 1 Flashcards

(34 cards)

1
Q

-a well-informed sense of assurance that the information risks and controls are in balance.
-protection of both data and physical assets.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-must review the origins of this field to understanding of information security today.

A

security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-the quality or state of being secure- to be free from danger.
-a successful organization should have multiple layrs of security in place

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-the protection of physical items objects or areas from unauthorized access and misuse.

A

physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-a risk management process that encourage managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands

A

operations security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the protection of voice and data networking components connections and content.

A

communication security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-was standard based on confidentiality, integrity, and availability.
-now expanded into list of critical characteristics of information.

A

C.I.A triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(key information security concepts)
-a subject or object’s ability to use manipulate, modify or affect another subject or object

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(key information security concepts)
-the organizational resource that is being protected

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(key information security concepts)
-an intentional and unintentional act that can damage or otherwise compromise information in the systems that support it.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(key information security concepts)
-these are security mechanisms policies or procedures that can successfully counter attack reduce risk resolve vulnerabilities and otherwise imrpove securiity within an organization

A

control, safeguard or countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(key information security concepts)
-a technique used to compromise the system

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(key information security concepts)
-a condition or state of being exposed,

A

exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(key information security concepts)
-a single instance of information asset suffering damage or destruction unintended or unauthorized modification or disclosure or denial of use.

A

loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(key information security concepts)
the entire set of controls and safeguards including policy education training and awareness and technology that the organization implements to protect the asset.

A

protection profile or security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(key information security concepts)
-the probability of an unwanted occurence such as an adverse event or loss

17
Q

(key information security concepts)
-a category of objects people or other entities that represent a danger to an asset

18
Q

(key information security concepts)
-the specific instance or a component of a threat

19
Q

(key information security concepts)
-a weakness of fault in a sstem or protection mechanisms that opens it to attack or damage.

A

vulnerability

20
Q

(critical characterisitics of information)
-an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

21
Q

(critical characteristics of information)
-an attribute of information that describes how data is free of errors and has the value that the user expects.

22
Q

(critical characteristics of information)
-an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.

23
Q

(critical characteristics of information)
-an attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuas or systems

A

confidentiality

24
Q

(critical characteristics of information)
-an attribute of information that describes how data is whole complete and uncorrupted

25
(critical characteristics of information) -an attribute of information the describes how data has value or usefulness for an end purpose
utility
26
(critical characteristics of information) -an attribute of information that describes how the data's ownership or control is legitimate or authorized
possession
27
-a graphical representation of the architectural approach widely used in computer and information security
mccumber cube
28
-is entire set of components necessary to use information as a resource in the organization
information security
29
(components of an information system) -includes applications including operating systems and assorted command
software
30
(components of an information system) -is a physical technology that houses and executres the softare stores and transports the data and provides interfaces for the entry and removal of information from the system
hardware
31
(components of an information system) -that are stored processed and transmitted by a computer system must be protected.
data
32
(components of an information system) -can be weakest link in an organization's information security program unless policy education and training awareness and technology are properly employed to prevent people from a accidentally or intentionally damaging or losing information
people
33
(components of an information system) -are written in instructions for accomplishing a specific task
procedures
34
(components of an information system) -is a component created much of the need for increased computer information security even with the best planning and implementation it is impossible to obtain perfect information security.
networks