Domain II – Information Security - Section A: Information Protection Flashcards

1
Q

IT governance

A

consists of the leadership, organizational structures, and processes that ensure that the enterprise’s information technology supports the organization’s strategies and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer‐Based Information Systems (CBIS)

A

is a system for collecting data, processing it into information, and storing the information for future reference and output. The system consists of six components:

a. Hardware
b. Software
c. Data/information
d. Procedures
e. People
f. Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The four major phases of activity in a CBIS are:

A

a. Input phase during which data is captured electronically and converted to a form that can be processed by a computer.
b. Processing phase during which data is converted into an appropriate form of information.
c. Output phase during which the user makes use of information to perform and manage business activities and for decision‐making.
d. Storage phase during which data, information, and processing instructions are stored in a computer‐usable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IIA’s glossary defines IT controls

A

are controls that support business management
and governance as well as provide general and technical controls over information technology infrastructure such as applications, information, infrastructure, and people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical access and environmental controls (General IT Controls)

A

are controls to physically protect the information systems hardware and software. These controls are appropriate to consider during the physical design of a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical access controls (General IT Control)

A

are mainly implemented through the use of special security software and/or by utilizing features of other applications software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security software

A

is software that controls the logical access to information systems.
=> It typically includes user authentication, granting access in accordance with predefined rules, and monitoring, logging and reporting usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data diddling

A

is the changing of the data prior to its input to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan horse

A

is a malicious fraudulent code hidden in an authorized program that is executed every time the authorized program is executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses

A

include a variety of malicious program codes that are inserted into other programs or data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worms

A

are malicious programs that destroy data or utilize significant computer and communication resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rounding down

A

involves drawing small amounts of money from a computerized transaction or account and depositing them in the perpetrator’s account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Salami techniques

A

involve the slicing down of small amounts of money from a computerized transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logic bombs

A

are malicious codes similar to computer viruses, but they do not replicate themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asynchronous attacks

A

are attacks that change data while available to be transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trap doors

A

are exits from an authorized program that permits the insertion of unauthorized logic.

17
Q

Data leakage

A

is acquiring information out of the computer system in an unauthorized manner or in an authorized manner but by an unauthorized individual.

18
Q

Piggybacking

A

is the act of following an authorized person physically through a door or electronically through a connection to gain unauthorized access.

19
Q

Wire‐tapping

A

is the eavesdropping on information being transmitted over a telecommunications line.

20
Q

Denial of Service

A

is a malicious attack that disrupts or completely denies service to legitimate users.

21
Q

Authentication

A

refers to the use of security measures to authenticate identity.
=> Authentication protects against fraudulent logon activities by identifying and verifying the identity of the users and the users’ access authorizations.

22
Q

Single‐factor (basic) Authentication

A

usually refers to password‐based authentication that is associated with a user’s unique identity.

23
Q

Multi‐factor Authentication

A

refers to the use of multiple factors to identify the users; typically a user id, with a password, and a token (e.g. smart cards, biometric info, pins generated by device) that is in the physical possession of the user.

24
Q

Cryptographic Authentication

A

uses additional methods for authentication primarily relying on encrypting and decrypting the sensitive information used for authentication such as public key authentication, password permutations, and digital signatures.

25
Q

Application controls

A

are controls over the input, processing, and output functions of a computer‐based information system.

26
Q

Input controls

A

are techniques and procedures used to validate, verify, and edit data to ensure that only authorized and correct data are input into the system for processing.

27
Q

Processing controls

A

are procedures to provide reasonable assurance that data input is processed as authorized and master files are updated in a complete and accurate manner.

28
Q

Output controls

A

are controls to ensure that output from the information system is accurate, complete, and distributed only to authorized individuals.

29
Q

Integrity controls

A

are controls to ensure the integrity of data during the various phases to ensure consistency and validity.

30
Q

Audit trail

A

are controls that enable management and/or the auditor to track individual transactions throughout the system from their source to their output and vice versa. The trail is intended to disclose who did what and when to the data to highlight the source and/or reason for any errors and/or irregularities.