quiz Flashcards

(51 cards)

1
Q

It is concerned with safeguarding the physical
assets, people, and infrastructure of an
organization from unauthorized access, damage,
theft, or harm.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

people, hardware, and supporting
systems, which includes buildings and their various parts.

A

Physical Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are critical components of a
comprehensive security strategy for protecting facilities
and assets.

A

Physical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These are obvious barriers make it
clear to people that they are not allowed to walk beyond a
certain point.

A

Walls or Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Obvious points of access.

A

Gate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

assigning it on a gate, a door, or an asset allows
you to set rules for passage and usage that can be
interpreted by a human being or referred to an authorizing
level of management.

A

Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They should probably appear as a subset
of guards.

A

Guard Dogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves securing the
outer boundaries of a facility.

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It regulate and
monitor entry and exit points to a facility.

A

Access Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It include closed-circuit
television cameras strategically placed to
monitor and record activities within and around
the facility.

A

Surveillance Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It uses sensors
to detect unauthorized entry or movement within
secured areas.

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It contributes to the overall
safety of a facility by reducing blind spots and
enhancing the effectiveness of other security
measures.

A

Security Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It provide additional
protection against forced entry, vehicle attacks,
or other physical threats.

A

Physical Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– They play a crucial role in
monitoring access points, conducting patrols,
and responding to emergencies.

A

Security Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It uses
unique physiological or behavioral
characteristics for identity verification.

A

Biometric Access Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These plans include designated evacuation routes, assembly points, and emergency
communication systems.

A

Emergency Response and Evacuation Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It include measures
like fire suppression systems, climate control,
and humidity regulation to protect physical
assets from environmental hazards.

A

Environmental Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It involves a comprehensive approach that
encompasses project management, technical
aspects, non-technical aspects, and
certification/accreditation processes.

A

Implementing Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– It
involves planning, executing, and controlling
activities to ensure that security measures are
effectively implemented within an organization.

A

Information Security Project Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It
involves deploying and configuring security
technologies, tools, and measures to protect
information assets.

A

Technical Aspects of Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It
involves policies, procedures, training, and
awareness campaigns aimed at fostering a
security-conscious culture within the
organization.

A

Nontechnical Aspects of Implementation

21
Q

It involves assessing and
validating the effectiveness of an organization’s
information security controls.

A

Information System Security Certification
and Accreditation

22
Q

– It is a critical aspect
of managing a secure information assurance security

A

Information Security Maintenance

23
Q

It is meant to be a generic
description of what an organization should do to provide a
secure environment for itself.

A

Security Management Model

24
This is being implemented to define the framework for decision-making, accountability, and responsibility in information security.
Security Governance
25
It is embraced to detect security incidents and vulnerabilities in real-time.
Continuous Monitoring and Improvement
26
This is applied to guide the ongoing development, maintenance, and improvement of security measures.
Security Lifecycle Models
27
– It is ensured to conduct regularly and that this plan is dynamic, adapting to changes in the organization and the external environment.
Risk Management Models
28
This is established and monitored to measure the effectiveness of security controls.
Security Metrics and Key Performance Indicators
29
Protecting sensitive government information, military communications, and critical infrastructure from cyber threats is crucial for maintaining the country's security and stability.
National Security Concerns
30
About the awareness campaigns which can help prevent common security pitfalls such as weak passwords, social engineering attacks, and unsafe online behavior.
Education and Awareness
31
are governed by a combination of legal frameworks, industry standards, and organizational policies.
Ethical Laws on IT
32
Enacted to protect the fundamental human right to privacy, this law governs the processing of personal information.
DATA PRIVACY ACT OF 2012 (R.A. NO. 10173)
33
It addresses issues related to online contracts, digital signatures, and the use of electronic data messages.
ELECTRONIC COMMERCE ACT OF 2000 (R.A. NO. 8792)
34
- Enacted to address offenses committed using the internet, this law includes provisions on cybercrime, such as illegal access, data interference, computer-related fraud, and content-related offenses.
CYBERCRIME PREVENTION ACT OF 2012 (R.A. NO. 10175)
35
This law criminalizes the unauthorized recording, sharing, or publication of private acts through photos or videos without the consent of the individuals involved.
ANTI-PHOTO AND VIDEO VOYEURISM ACT OF 2009 (R.A. NO. 9995)
36
This law penalizes fraudulent acts involving access devices, including credit cards and debit cards.
ACCESS DEVICES REGULATION ACT OF 1998 (R.A. NO. 8484)
37
– It protects copyright and related rights. It covers software and other digital content created by individuals or organizations.
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES (R.A. NO. 8293)
38
With the implementation of this, organizations are legally obligated to ensure the protection of personal data.
Data Protection and Privacy
39
The Philippines, like many other countries, faces a range of it, including malware, phishing attacks.
Cybersecurity Threat
40
– It is all about the growth of digital financial services and e-commerce in the Philippines that requires a secure online environment.
Financial Transactions and E-commerce
41
Ensuring the security of these systems is crucial to prevent disruptions,safeguard national interests, and protect citizens' data.
Government Systems and Critical Infrastructure -
42
This type of study focuses on one individual. This case study would use several types of research to determine an outcome.
Person
43
This type of study focuses on a group of people. This could be a family, a group, or friends, or even coworkers.
Group
43
This type of study focuses on a business or an organization.
Organization/Company
44
– This type of study focuses on a place, and how and why people use the place.
Location
45
– This type of study focuses on an event, whether cultural or societal, and how it affects those that are affected by it.
Event
46
A step to determine what the case study will be about.
Define The Task, Question or Topic
47
– This research stage is the longest and most detailed of the case study process.
Do Research, Interviews, Collect Data
48
– A step to know what the study proved and what conclusions can be made.
Make Recommendations and Form Conclusions
49
It that requires a cover page, references, and all the acquired data and information compiled in a readable and cohesive report.
Write The Report