IDENTIFICATION Flashcards

PRELIM

1
Q

It is a specialized framework designed to integrate security into every phase of the traditional systems development life (SDLC)

A

Security Systems Development Life Cycle (SecSDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destructions

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensuring that information is accessible only to authorized individuals.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Maintaining the accuracy and completeness of information.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensuring that information is accessible when needed by authorized users.

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attempts to trick users into revealing sensitive information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious software such as viruses, worms, and trojans

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overwhelming a system with traffic to make it unavailable.

A

Distributed Denial of Service (DDos) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Injecting malicious SQL code into a web application.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Manipulating people to gain unauthorized access.

A

Social Engineering Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transforming data into a code to protect its confidentiality.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Security devices that filter traffic.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Limiting access to information based on user roles and permissions.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Monitoring networks for suspicious activity

A

Operations and Maintenance Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Creating copies of data to restore in case of loss.

A

backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is fundamental in every aspect of human life, driving decisions, enabling communication, and powering innovations.

A

Information

17
Q

Respecting the privacy rights of individuals

A

Confidentiality

18
Q

Acting with competence and responsibility.

A

Accountability

19
Q

Mistakes made by users or administrators can lead to security breaches.

A

User Domain, Human Failure

20
Q

This phase builds upon the architectural concepts developed previously

A

Design Phase

21
Q

The developed system is deployed in a production environment.

A

Implementation Phase

22
Q

It involves identifying and assessing security needs and setting goals based on the business’s security policies.

A

initiation Phase

23
Q

The system is developed and built according to the design.

A

Development Phase

24
Q

The focus is on selecting technologies, methodologies, and security frameworks that will be used throughout the development of the system.

A

System Concept Development Phase

25
Q

This phase focuses on maintaining and updating the system to ensure that it remains secure over time.

A

Operations and Maintenance Phase