Chapter 1 Flashcards

1
Q

Information security refers to protecting information administratively, physically, and technically to prevent damage, alteration, and leakage of information while being collected, processed, stored, and transmitted information.

A

Concept of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The need to guarantee privacy and prevent crimes on the Internet is gradually increasing. Concerns about the leakage of major domestic technologies and information are also increasing, due to globalization, as the entire world is connected through the Internet.

A

Need for information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the three goals of information security are confidentiality, integrity, and availability. Efforts should be made to administratively, physically and technically ensure these attributes.

A

Goals of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to a method of verifying whether the information exchanged between the sender and receiver, who are the information, has not been altered or deleted and whether the subject (sender and receiver) is legitimate.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to security technology to prevent the repudiation after receiving and sending a message, by verifying the fact of message receiving/sending.

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is largely classified into cryptographic techniques and encryption protocol techniques.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to the prevention of the sender’s claim that the message was not received after receiving the message.

A

Non-repudiation of origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to the prevention of receiver’s claim that the message was not delivered after sending the message.

A

Non-repudiation of delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to the prevention of the receiver’s claim that the message was not received after receiving the message.

A

Non-repudiation of receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refer to the products that use cryptographic techniques.

A

Cryptography protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the method of providing both data integrity and signature authentication, by performing a has operation on a specific document, using the signature’s private key.

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a mathematical function that converts a random string of various sizes into a short hast value

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is an abbreviation of malicious software and refers to software designed to perform malicious actions against computers, file systems, or networks.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Bitcoin cryptocurrency system and all transactions occurring in the network are recorded in one public ledger, distributed, and stored in a single ledger

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

established in July 2012 to set the technical (de facto) standard for authentication method, using biometrics in the online environment.

A

FIDO (Fast Identity Online Alliance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a security solution installed between a public and a private network to protect the private network from external threats.

17
Q

is a security system that detects and blocks intrusions in real-time by monitoring unauthorized or abnormal behavior within a network.

A

Intrusion Prevention System (IPS)

18
Q

enables secure use of access control, authentication, and confidentiality services over a public network, mimicking the security of a private network.

A

Virtual Private Network (VPN):

19
Q

allows a user to access multiple sites or services without needing to re-authenticate after logging into one site.

A

Single Sign-On (SSO)

20
Q

positioned in front of a web server and monitors incoming traffic using the HTTP/HTTPS protocols

A

Web Application Firewall (WAF)

21
Q

ensures that endpoints, such as user computers, comply with security policies before accessing an internal network.

A

Network Access Control (NAC)

22
Q

automatically detects and blocks unauthorized wireless devices by continuously monitoring an organization’s wireless LAN.

A

Wireless Intrusion Prevention System (WIPS)

23
Q

integrates security management functions into a consistent and intuitive interface.

A

Enterprise Security Management (ESM)

24
Q

extend the role of ESM by providing early warnings and monitoring intelligent threats.

A

Security Information and Event Management (SIEM)