Chapter 1 Key Concepts and Terms Flashcards
3 tenets of information systems security
Confidentiality, integrity, and availability.
AUP (Acceptable Use Policy)
what users are allowed and not allowed to do with organization
availability
a mathematical calculation where A=(Total Uptime)/(Total Uptime+Total Downtime)
availability
Security actions that ensure that data is accessible to authorized users.
BCP
Business Continuity Plan- gives priorities to the functions an organization needs to keep going.
CIPA (Children’s Internet Protection Act)
protects minors from inappropriate content when accessing the internet in schools and libraries
Confidentiality
the act of holding information in confidence, not to be released to unauthorized individuals
Cryptography
Practice of hiding data and keeping it away from unauthorized users
Cybersecurity
The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.
Data classification standard
The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data.
Downtime
the total amount of time the IT system, application and data are not accessible.
DRP
Disaster Recovery Plan- how a business gets back on its feet after a major disaster such as a fire or hurricane.
Encryption
the process of transforming data from clear text into ciphertext.
End User License Agreement (EULA)
A legal contract between the author of software and the end user that defines how the software can be used
Ethernet LAN
LAN solution based on the IEEE 802.3 CSMA/CD standard for 10/100/1000mbps.
FERPA (Family Educational Rights and Privacy Act)
Passed in 1974, protects the private data of students and their school records.
FISMA (Federal Information Security Management Act)
requires federal civilian agencies to provide security controls over resources that support federal operations.
GLBA (Gramm-Leach-Bliley Act)
Federal law enacted in 1999 to control the ways that financial institutions deal with the private information of individuals
HIPAA (Health Insurance Portability and Accountability Act)
Federal law passed in 1996, requires health care organizations to have security and privacy controls implemented to ensure patient privacy.
Hypertext Transfer Protocol Secure (HTTPS)
an encrypted form of information transfer on the Internet that combines HTTP and TLS