IAS Flashcards

lesson 1

1
Q

study of how to protect information from destruction, degradation, manipulation, and exploitation, and also how to recover it

A

information assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the aspects of information needing protection

A

availability, integrity, confidentiality, authentication, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

timely, reliable access to data and information for authorized users

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

protection against unauthorized modification of information

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

assurance that information is not disclosed to unauthorized persons

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of sender’s identity

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

four major categories of information assurance

A

physical security, personnel security, it security, operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

give examples of proper practice of information assurance

A

*hard to guess passwords
*encrypting hard drives
*locking sensitive documents
*assigning security clearances to staffers
*using SSL for data transfers
*having off-site backup of documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does SSL mean

A

secure socket layer protocol; websites that are safe or have https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

protection of hardware, software, and data against physical threats to prevent loss of assets

A

physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

variety of ongoing measures taken to reduce the likelihood and severity of accidents

A

personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

inherent technical features and functions that collectively contribute to an IT infrastructure

A

IT security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

involves the implementation of standard operational security procedures

A

operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the objective of operational security is to

A

*achieve a known secure system state at all times
*prevent accidental or intentional theft, release destruction, alteration, misuse, or sabotage of system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

according to raggad’s taxonomy of information security, what are the five interacting components in a computing envi

A

activities, people, data, technology, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three levels of information security

A

physical, information infrastructure, perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

desired effect: to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

attacker’s operation: physical attack and destruction–electromagnetic attack, visual spying, intrusion, scavenging and removal, wiretapping, interference, eavesdropping

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

defender’s operation: COMPSEC, COMSEC, ITSEC, OPSEC

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

covers information and data manipulation ability maintained in cyberspace

A

infrastructure level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

desired effects: influence the effectiveness and performance of information functions

A

infrastructure level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

attackers operations: impersonation, piggybacking, spoofing, network attacks, malware, authorization attacks, active misuse, and denial of service

A

infrastructure level

23
Q

defender’s operation: encryption and key management, intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and standards

A

infrastructure level

24
Q

perceptual level is also called

A

social engineering

25
desired effects: to influence decisions and behaviors
perceptual level
26
attacker’s operations: deception, blackmail, bribery and corruption, social engineering, trademark and copyright infringement, defamation, diplomacy, creating distrust
perceptual level
27
defender’s operations: psychological testing, education, biometrics, watermarks, keys, passwords
perceptual level
28
flip side of information assurance
information warfare
29
info warfare - type 1
managing an opponent’s perception through psychological operations/truth projection
30
information warfare - type 2
denying, destroying, degrading, or distorting the opponent’s information flows to disrupt their ability to carry out operations
31
information warfare - type 3
gathers intelligence by exploiting the opponent’s use of information systems
32
who are the offensive players int he world of IW
insiders, hackers, criminals, corporations, governments, terrorists
33
consists of employees
insiders
34
gains unauthorized access to information systems for thrills, challenge, power, or profit
hackers
35
target information that may be of value to them
criminals
36
actively seek intelligence on competitors or steal trade secrets
corporations
37
seek military, diplomatic, and economic secrets of foreign governments
governments
38
politically motivated and may seek to cause maximal damage to information and infrastructure
terrorists
39
relies on established procedures and mechanisms for prioritizing restoration of essential functions
capability restoration
40
a resource being protected
asset
41
devices, computers, people
physical assets
42
logical assets
information, data, intellectual property
43
system assets
any software, hardware, data, administrative, physical, communications, or personnel resource
44
the items being protected by the system
objects
45
entities that execute activities and request access to objects
subjects
46
operations, primitive or complex, that can operate on objects must be controlled
actions
47
the information is free of error and has the value expected
accuracy
48
the information is genuine
authenticity
49
the information has not been disclosed to unauthorized parties
confidentiality
50
the information is whole, complete, and uncorrupted
integrity
51
the information has value for the intended purpose
utility
52
the data is under authorized ownership and control
possession
53
security measures to establish the validity of a transmission, message, or originator
authentication