Chapter 1 Flashcards
The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).
a. Data Integrity
b. Availability
c. Computer Security
d. Privacy
c. Computer Security
Assures that private or confidential information is not made available or disclosed to unauthorized individuals.
a. Data Integrity
b. Data Confidentiality
c. System Integrity
d. Accountability
b. Data Confidentiality
Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
a. Privacy
b. Integrity
c. Availability
d. Computer Security
a. Privacy
Assures that information and programs are changed only in a specified and authorized manner.
a. Availability
b. Privacy
c. Data Integrity
d. Availability
c. Data Integrity
Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
a. System Integrity
b. Privacy
c. Security Policy
d. Data Confidentiality
a. System integrity
Assures that systems work promptly and service is not denied to authorized users.
a. Computer Security
b. Data Confidentiality
c. Data Integrity
d. Availability
d. Availability
What is the CIA triad.These are the fundamental security objectives for both data and for information and computing services.
a. Communication, Interception, and Accountability
b. Confidentiality, Integrity, and Availability
c. Confidentiality, Interception, and Accountability
d. Communication, Integrity, and Availability
b. Confidentiality, Integrity, and Availability
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of ____ is the unauthorized disclosure of information.
a. Data Integrity
b. Confidentiality
c. Availability
d. Communication
b. Confidentiality
Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. a loss of ____ is the unauthorized modification or destruction of information.
a. Integrity
b. Availability
c. Confidentiality
d. Authenticity
a.Integrity
Ensuring timely and reliable access to and use of information. A loss of ___ is the disruption of access to or use of information or an information system.
a. Authenticity
b. Integrity
c. Availability
d. Confidentiality
c. Availability
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying their users are who they say they are and that each input arriving at the system came from a trusted source.
a. Accountability
b. Authenticity
c. Availability
b. Authenticity
The security tool that generates the requirement for actions of an entity to be traced uniquely to that entity. this supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems aren’t yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
a. Accountability
b. Availability
c. Authenticity
a. Accountability
Including computer systems and other data processing, data storage, and data communications devices
a. Software
b. Hardware
c. Data
b. Hardware
Including the operating system, system utilities, and applications.
a. Software
b. Hardware
c. Data
a. Software
Including files and databases, as well as security-related data, such as password files.
a. Software
b. Hardware
c. Data
c. Data
An entity that attacks, or is a threat to, a system
a. Adversary
b. Keylogger
c. Eavesdropping
d. Exploiting
a. Adversary (Threat Agent)
an assault on system security that derives from an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
a. Threat
b. Vulnerability
c. Attack
d. Corruption
c. Attack
An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.
a. Countermeasure
b. Security Policy
c. Interception
d. Vulnerability
a. Countermeasure
An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.
a. Attack
b. Misuse
c. obstruction
d. Risk
d. Risk
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.
a. System Resource
b. Security Policy
c. Denial Of Service
b. Security Policy
Data contained in an information system; or a service provided by a system; or a system capability, such as processing power or communication bandwidth; or an item of system equipment (i.e., a system component - hardware, firmware, software, or documentation); or a facility that houses system operations and equipment.
a. encryption
b. OSI security architecture
c. System Resource
d. Threat
c. System Resource (Asset)
A potential for violation of security, which exists when there is a circumstance, capability, action, or event, that could breach security and cause harm. That is, a ___ is a possible danger that might exploit a vulnerability.
a. Threat
b. Attack
c. Risk
d. Corruption
a.Threat
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
a. Corruption
b. Vulnerability
c. Threat
d. System Resource
b. Vulnerability
When the computer system is ______ it does the wrong thing or gives wrong answers. for example, stored data values may differ from what they should be because they have been improperly modified. This is a vulnerability of the system.
a. Leaky
b. Corrupted
c. Unavailable
b. Corrupted
A computer system is ____ when someone who should not have access to some or all of the information available through the network obtains such access. This is a Vulnerability of the system
a. Leaky
b. Corrupted
c. Unavailable
a. Leaky
Another Vulnerability of a computer system is when it becomes ____. its when using the system or network becomes impossible or impractical.
a. Leaky
b. Corrupted
c. Unavailable
c. Unavailable
An attempt to alter system resources or affect their operation.
a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack
c. Active Attack
An attempt to learn or make use of information from the system that does not affect system resources.
a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack
a. Passive Attack