Final Exam Flashcards

1
Q

Determining identity via a trusted process

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Act of recognizing an authenticated person

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allowing authorized person access to a resource

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network hosts and valuable information

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something that allows user to attack and/or compromise the system

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Procedure used to exploit a vulnerability

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Person, process, or host used to wage a threat

A

Threat Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overall exposure experienced by a network or business

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Event in which a threat exploits a vulnerability

A

Attack/incident exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Event in which a system loses integrity

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Procedure taken to minimize a vulnerability or threat

A

Counter-measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User who attempts to defeat authentication and gain illicit access to resources

A

Malicious user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use of code or procedures in an attack

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any data used to prove idenitity

A

Authentication Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process by which use of resources and services is granted or denied

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process of tracking users and their actions on the network

A

Auditing or accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a U.S. intelligence agency responsible for providing the US government with encrypted communications (information assurance) and the reading of encrypted communications (signals intelligence) of other nations

A

National Security Agency (NSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An American computer professional, former employee of the Central Intelligence Agency (CIA) and former contractor for the National Security Agency (NSA). In May 2013, he flew from Hawaii to Hong Kong, where he met w/ journalists Glenn Greenwald and Laura Poitras and released numerous documents to them. With his permission, the journalist later revealed his identity to the international media

A

Edward Joseph Snowden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What did Russian government grant Snowden?

A

A one-year temporary renewable asylum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a statement that describes what the organization’s practices are

A

Privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The information contained in the privacy policies of companies usually follow what?

A

Fair Information Practices Principles (FIPP) set fourth by the Federal Trade Commission (FTC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of trust seal that are an attempt by companies at self-regulation regarding privacy of consumers and company verification

A

Privacy Seals

23
Q

Trust Seals are available for a free

A

Got it!?

24
Q

Types of government privacy regulations

A

USA Patriot act of 2001
Gramm-Leach-Bliley Financial services Modernization Act of 1999 (GLBA)
Family Educational Rights and Privacy Act (FERPA)
Children’s Online Privacy Protection Act of 1998 (COPPA)

25
Q

An act that repealed part of the Glass-Steagall act of 1933, removing barriers in the market among banking companies, securities companies and insurance companies that prohibited any one institution from acting as any combination of an investment bank, commercial bank, and an insurance company

A

Gramm-Leach-Bliley Act (GLB) or Financial Services Modernization Act of 1999

26
Q

Must communicate with users about how information is shared and give them a chance to opt out

A

Financial privacy rule

27
Q

Requires financial institutions to develop a written information security plan that describes how the company is prepared for, and plans to contribute to protect clients’ nonpublic personal information

A

Safeguards Rule

28
Q

Encourages the organizations covered by the GLB to implement safeguards against pretexting

A

Pretexting (social engineering) Protection

29
Q

Permits a school to disclose personally identifiable information from educational records of an “eligible student” to his or her parents, if student if a dependent

A

FERPA (Family Educational Rights and Privacy Act

30
Q

Via what is private data collected during web activities, when when no private info is entered?

A

Online forms, clickstreams, and cookies

31
Q

Small text files located on your computer to store information about you, your accounts, and your computer. A text data passed to a browser from a Web server. Then the text data is sent back to the Web server with every subsequent request to the Web server. Used by Web applications to store state and user information.

A

Cookies

32
Q

Who is Edward Snowden?

A

Former NSA Contractor

33
Q

In what phase is preliminary investigation?

A

Planning

34
Q

A set of components that interact to achieve a common goal

A

System

35
Q

A collection of hardware, software, data, people, and procedures that work together to produce quality information

A

Information System

36
Q

System development activities are group into..?

A

Phases and is called system development life cycle (SDLC)

37
Q

Scope, schedule, and resources

A

Iron Triangle

38
Q

The liaison between users and IT professionals

A

Systems analyst

39
Q

SDCL

A

System Development Life Cycle

40
Q

Why build the system? Who should be responsible for building it? Begins when the steering committee receives a project request.

A

Planning

41
Q

Who uses the system? What will it do? Where and when will the system be used? What will the system look like?

A

Analysis/Requirements

42
Q

How will the system work?

A

Design/Development

43
Q

Build, deliver, and maintain system

A

Implementation/Maintenance

44
Q

Who initiates a system development project?

A

FRSS - Request for system services

45
Q

Decision-making body for the company

A

Steering committee

46
Q

What does project management do?

A

Planning, scheduling, and controlling the activities during system development

47
Q

Key deliverables

A

System Request

48
Q

Determines and defines the exact nature of the problem improvement, interview the user who submitted the request, determine if request is feasible

A

Preliminary feasibility investigation

49
Q

Study how the current system works, determine the users’ wants, needs, and requirements, recommend a solution, know as logical design

A

Detailed Analysis

50
Q

A measure of how suitable the development of a system will be to the organization

A

Feasibility

51
Q

Key deliverable for analysis/requirements

A

Feasibility Analysis/system proposal (assess feasibility)

52
Q

An analysis and design technique that describes processes that transform inputs into outputs

A
Process modeling (data flow diagrams)
General term for diagram techniques: modeling
General term for outputs: schematics
53
Q

a tool that graphically shows the connections among entities

A

Entity-relationship diagram (ERD)