Security And Risk Management (ch 1-4) Flashcards

1
Q

What is the CIA Triad

A

Confidentiality- the principle that objects are not disclosed to unauthorized subjects

Integrity- the principle that objects retain their veracity and are only modified by authorized subjects

Availability- the principle that authorized subjects are granted timely and uninterrupted access to objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain how identification works

A

Identification is the process by which a subject professes an identity and accountability is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Understand the process of authentication

A

Authentication is the process of verifying or testing that a claimed identity is valid. Authentication requires information from the subject that must exactly correspond to the identity indicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does authorization fit into a security plan

A

Authorization ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is security governance

A

The collection of practices related to supporting, defining, and directing the security efforts of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the auditing process

A

Auditing or monitoring is the programmatic means by which an authenticated subject is held responsible for their actions on a system. It detects unauthorized or abnormal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps of the Business Impact Assessment process?

A
Identification of Priorities
Risk Identification
Likelihood Assessment
Impact Assessment
Resource Prioritization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What law makes it a crime to cause malicious damage to a “federal interest” computer?

A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of intellectual property protection is best suited for computer software?

A

Trade secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of the following BCP phases involves the largest commitment of hardware and software resources?

A

The BCP implementation phase involves the largest commitment of hardware and software resources. The other phases are more manpower intensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A host organization that houses on-site security staff has what form of security system?

A

Proprietary system: This is the same thing as a central station system; however, the host organization has its own on-site security staff waiting to respond to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under what form of control are people and processes all included, managed, and controlled?

A

Administrative control takes into consideration the processes and people who operate within an organizational security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly