Ch. 8 Flashcards

1
Q

List 5 IT-related controls

A

SCPPA

  1. Security
  2. Confidentiality
  3. Privacy
  4. Processing Integrity
  5. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Security

A

Access (both physical and logical) to the system and its data is controlled and restricted to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Confidentiality

A

Sensitive organization information is protected from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Privacy

A

Personal information about customers, employees, suppliers, or business partners is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Processing Integrity

A

Data are processed accurately, completely, in a timely manner, and only with proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Availability

A

The system and its information are available to meet operation and conctractual obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Life Cycle

A
  1. Assess threats & select risk response
  2. Develop and communicate policy
  3. Acquire & implement solutions
  4. Monitor performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define defense-in-depth

A

Employing multiple layers of controls to avoid a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define time-based model of security

A

Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough for the organization to respond before damage is done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Time-based Formula

A

P > D + C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Authentication

A

Verifying the identity of the person or device attempting to access the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Biometric identifier

A

A physical or behavioral characteristic that is used as an authentication credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define multifactor authentication

A

The use of two or more types of authentication credentials in order to achieve greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define multimodal

A

Use of multiple authentication credentials of the same type to achieve greater security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Authorization

A

The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Access Control Matrix

A

A table used to implement authorization controls

17
Q

Define compatibility test

A

Matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action

18
Q

Define Access Control List

A

A set of If-Then rules used to determine what to do with arriving packets