Chapter 8 Flashcards
the Trust Services Framework reliability principle that states that users must be able to enter, update and retrieve data during agreed upon times is known as
availability
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that
is complete, accurate, and valid
The three fundamental information security concepts
- security is a technology issue based on prevention
- the idea of defense in depth employs multiple layers of controls
- the time based model of security focuses on the relationship between preventive, detective and corrective controls
some of the essential criteria for successfully implementing each of the principle that contribute to systems reliability, as discussed in the Trust Services Framework
- developing and documenting policies
- designing and employing appropriate control procedures to implement policies
- monitoring the system and taking corrective action to maintain compliance with policies
Who was a part below who was involved with developing the Trust Services Framework
AICPA (American Institute of CPAs)
information security procedures protect information integrity by
preventing fictitious transactions
identify one aspect of systems reliability that is not a source of concern with regards to a public cloud
efficiency
identify the primary means of protecting data stored in a cloud from unauthorized access
authentication
Virtualization refers to the ability of
running multiple systems simultaneously on one physical computer
True or False: Cloud computing can potentially generate significant cost savings for an organization
True
True or False: Cloud computing is traditionally more secure than traditional computing
False
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as
confidentiality
The Trust Services Framework reliability principle that stats personal information should be protected from unauthorized disclosure is known as
privacy
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as
security
What is not a useful way to control procedure regarding access to system outputs
allowing visitors to move through the building without supervision
verifying the identity of the person or device attempting to access the system is an example of
authentication
restricting access of users to specific portions of the system as well as specific tasks, is an example of
authorization
this is an example of a preventative control
encryption
this is an example of a detective control
log analysis
what is an example of a corrective control
incident response teams