IAS chap 1 Flashcards

Pasadong Midterm cutiee

1
Q

fIs the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.

Is about protecting sensitive information from being stolen, misused, or damaged.

A set of security procedures and tools that broadly protect sensitive enterprise information

It refers to the processes and tools designed and deployed to protect sensitive business information

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The first operating system to integrate security into its core functions

A

MULTICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is the assurance that someone cannot deny the validity of something.

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It means protection.

______ is “the quality or state of being secure–to be free from danger.”

It refers to the methods, tools and personnel used to defend an organization’s digital assets.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To protect the physical items, objects, or areas of an organization from unauthorized access and misuse.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To protect the individual or group of individuals who are authorized to access the organization and its operations.

A

Personal security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To protect the details of a particular operation or series of activities.

A

Operations security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To protect an organization’s communications media, technology, and content.

A

Communications security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To protect networking components, connections, and contents.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Free from mistake or error and having the value that the end-user expects.

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The quality or state of being genuine or original, rather than a reproduction or fabrication.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The quality or state of preventing disclosure or exposure to unauthorized individuals or systems.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The quality or state of being whole, complete, and uncorrupted.

Means keeping information accurate, complete, and trustworthy.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The quality or state of having value for some purpose or end.

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The quality or state of having ownership or control of some object or item.

A

Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the entire set of software, hardware, data, people, procedures, and networks that enable the use of information resources in the organization.

Is like the brain and nervous system of an organization. It includes everything needed to store, process, and share information—computers, software, data, people, rules, and networks.

A

Information Software

17
Q

Physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system.

18
Q

Often the most asset
Main target of intentional attacks

19
Q

They have always been a threat to information security.

Social engineering.

Must be well trained and informed.

20
Q

Are written instructions for accomplishing a specific task.

A

Procedures

21
Q

A method of establishing security policies and/or practices that begins as a grassroots effort in which systems administrators attempt to improve the security of their systems.

A

Bottom-up approach

22
Q

A methodology of establishing security policies and/or practices that is initiated by upper management.

A

Top-down approach

23
Q

A formal approach to solving a problem based on a structured sequence of procedures.

A

Methodology

24
Q

The ______ contains different phases depending on the methodology deployed, but generally the phases address the investigation, analysis, design, implementation, and maintenance of an information system.

25
Q

Responsible for the assessment, management, and implementation of information security in the organization

Also be referred to as the manager for IT security, the security administrator, or by a similar title

A

Chief information security officer (CISO)

26
Q

Small team of people who are experienced in one or multiple facets of the required technical and nontechnical areas for the project to which they are assigned

A

Project team

27
Q

Creates and develops blueprints for information security
Incident response actions: Continuity planning, Incident response, Disaster recovery

A

Logical Design

28
Q

a senior executive who promotes the project and ensures its support, both financially and administratively, at the highest levels of the organization.

29
Q

A project manager who may also be a departmental line manager or staff unit manager, and who understands project management, personnel management, and information security technical requirements

A

Team leader

30
Q

the people who understand the organizational culture, existing policies, and requirements for developing and implementing successful policies.

A

Security policy developers

31
Q

individuals who understand financial risk assessment techniques, the value of organizational assets, and the security methods to be used.

A

Risk assessment specialists

32
Q

Dedicated, trained, and well-educated specialists in all aspects of information security from both technical and non-technical standpoints.

A

Security professionals

33
Q

individuals with the primary responsibility for administering the systems that house the information used by the organization.

A

Systems administrators

34
Q

A selection of users from various departments, levels, and degrees of technical knowledge assist the team
most directly impacted by the new system

35
Q

responsible for the security and use of a particular set of information.
usually determine the level of data classification associated with the data

A

Data Owner

36
Q

Responsible for the storage, maintenance, and protection of the information

A

Data Custodian

37
Q

the end systems users who work with the information to perform their daily jobs supporting the mission of the organization

A

Data Users