5.1 Flashcards

1
Q

What are the components of The information system

A

Procedures, people, hardware, networks, software, data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____________ is protecting information and information systems from unauthorized access use, disclosure, disruption modification or destruction

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This component of the IS has increased the necessity of information security…

A

Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Out off all the component of IS, They are considered the weakest link in an organization’s security program…

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This component of IS is considered the most difficult to secure..

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This component of IS is considered the most valuable to an organization and the main target for intentional attacks..

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ consists of facts and figures that are stored, processed, or transmitted in or out by the information system….

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This component of the Is is considered as physical assets which must be protected from harm, theft…..

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main goals of Information security?

A

Confidentiality , integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of protections?

A

Physical protection, awareness-based protection, technical protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The hardware component of Is requires which kind of protection?

A

Physical protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The people and procedures require which land of protection?

A

Awarness-based protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software, data, and networks require which kind of protection?

A

Technical protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptography, firewalls, access control systems are all examples of….

A

Security technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The main goals of information security are also commonly known as _________.

A

CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ________ is one of the main concerns in information security.

A

Security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the main two types of security attacks?

A

insider attack, external attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Insider and external attacks can be further classified into four categories: modification attack, fabrication attack, _________ attack, and _________ attacks

A

interception, interruption

19
Q

which security attacks affects confidentiality?

A

interception

20
Q

which security attacks affect integrity and availability?

A

interruption attacks, fabrication attacks, and modification attacks.

21
Q

_______ attacks allow an attacker to gain access to sensitive information.

A

interception

22
Q

_______ attacks allow an attack to make sensitive information unusable or unavailable to authorized users.

A

interruption

23
Q

________ attacks allow an attacker to tamper with sensitive information.

A

modification

24
Q

________ attacks is the type of attack in which the attackers inserts forged objects or information into the system, as if it was generated by an authorized user.

A

fabrication

25
Q

______ consists of the physical technologies installed in the IS that host and execute the software, store and transport the data and provides interfaces for entering and removing the information in the system.

26
Q

T or F: the physical location of computers and the computers themselves must be secured.

A

t, because a breach of physical security can result in a loss of information.

27
Q

information systems are often connected together to form ______ such as a LAN.

28
Q

Which component of IS requires extreme focus to secure it?

29
Q

T or F: the security of LANs become worse when they are connected to the internet.

30
Q

_______ protection involves the use of physical security policies, such as locks and keys that restrict access to the area where the hardware components are located.

31
Q

_____ protection involves education and training to prevent users from accidental or intentional misuse of information or procedures.

A

awareness-based

32
Q

_______ protection involves the use of security technologies to manage access to and usage of, a system or information by different users.

33
Q

T or F: technical protection can also be additionally applied for the protection of people and procedures.

34
Q

________ is the ability to prevent unauthorized disclosure of information so that sensitive information is accessible only to authorized users.

A

confidentialty

35
Q

______ is the ability to prevent unauthorized modification of information in order to maintain its accuracy, consistency, and trustworthiness over its entire life cycle.

36
Q

_________ is the ability to prevent unauthorized withholding of information so that it is available when needed by the authorized users.

A

availability

37
Q

______ attacks are security attacks performed by unauthorized users (outsiders).

38
Q

______ attack are security attacks performed by authorized users (insiders).

39
Q

_______ is any kind of malicious activity that attempts to collect, disrupt, deny, degrade or destroy information system resources or information itself.

40
Q

an ________ is a person who possesses the authority to perform an action or set of activites.

A

authorized user

41
Q

an _________ is a person who does not possess the authority to perform an action or set of activites.

A

unauthorized user

42
Q

__________ is the exposure of information to user(s) not authorized to access the information

A

unauthorized disclosure

43
Q

________ is the modification of info by user(s) not authorized to modify the information.

A

unauthorized modification