Topic 1 Flashcards

1
Q

Timely, reliable access

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection against unauthorized modification or destruction of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disclosed to unauthorized persons

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security measures to establish the validity of a transmission, message, or originator

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data delivery and recipient

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 Information Assurance (A.I.C.A.N)

A

Availability, Integrity, Confidentiality, Authentication, and Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tools and personnel used to defend an organization’s digital assets

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To protect the physical items

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Individual or group of individuals

A

Personal Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Series of activities

A

Operation Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organization’s communications media, technology, and content.

A

Communication Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Networking components, connections, and contents.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 5 Securities? (P.P.O.C.N)

A

Physical Security, Personal Security, Operation Security, Communication Security, Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Three characteristics that described the utility of information?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enables users who need to access information to do so without interference or obstruction and in the required format.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Free from mistake or error

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Reproduction or fabrication

A

Authenticity

19
Q

Preventing disclosure or exposure

A

Confidentiality

20
Q

Being whole

A

Integrity

21
Q

End-user, it is not useful

A

Utility

22
Q

Ownership or control of some object or item

A

Possession

23
Q

What are the 7 Critical Characteristics of Information? (A.A.A.C.I.U.P)

A

Availability, Accuracy, Authenticity, Confidentiality, Integrity, Utility, and Possession

24
Q

Entire set of software, hardware, data, people, procedures, and networks

A

Information System

25
Q

Includes applications (programs), operating systems, and assorted command utilities

A

Software

26
Q

Physical technology that houses and executes the software

A

Hardware

27
Q
  • Often the most asset
  • Main target of intentional attacks
A

Data

28
Q
  • People have always been a threat to information security
  • Social engineering
  • Must be well trained and informed
A

People

29
Q
  • Procedures are written instructions for accomplishing a specific task.
  • Threat to integrity of data
A

Procedures

30
Q
  • Locks and keys won’t work
A

Networks

31
Q

What are the 6 components of Information System (IS) | (S.H.D.P.P.N)

A

Software, Hardware, Data, People, Procedures, and Networks

32
Q

Grassroots effort

A

Bottom-up approach

33
Q
  • initiated by upper management
  • Higher probability of success
  • The project is initiated by upper-level managers
A

Top-down approach

34
Q

A formal approach to solving a problem based on a structured sequence of procedures

A

Methodology

35
Q
  • A methodology for the design and implementation of an information system
A

The Systems Development Life Cycle

36
Q
  • The problem, objectives, constraints, and scope of the project are identified
  • Begins with enterprise information security policy
A

Investigation

37
Q
  • consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems
  • Existing security policies, legal issues,
  • Perform risk analysis
A

Analysis

38
Q
  • Creates and develops blueprints for information security
  • Incident response actions: Continuity planning, Incident response, Disaster recovery
  • Feasibility analysis to determine whether project should continue or be outsourced
A

Logical Design

39
Q

final design selected

A

Physical Design

40
Q
  • Security solutions are acquired, tested, implemented, and tested again
A

Implementation

41
Q
  • Most important
  • Constant changing threats
  • Constant monitoring, testing updating and implementing change
A

Maintenance and Change

42
Q

What are the 6 SDLC Phases? (I.A.LD.PD.I.MC)

A

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance and Change.

43
Q
  • Senior technology officer is usually the chief information officer (CIO)
A

Senior Management

44
Q
  • Responsible for the assessment, management, and implementation of information security in the organization
  • also be referred to as the manager for IT security, the security administrator, or by a similar title
  • reports directly to the CIO
A

Chief information security officer (CISO)