Information Assurance 2 Flashcards

1
Q

The act of protecting data
from being observed by any
unauthorized persons.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of maintaining and
assuring the accuracy and
completeness of data
over
its entire lifecycle

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The act in which Information is accessible by
authorized users whenever they request the
information

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to
protect the cyber environment and organization and user’s assets

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is all about protecting data that is found in electronic form.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

KEY PRINCIPLES OF
INFORMATION SECURITY

A
  1. confidentiality
  2. integrity
  3. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organization and User’s Assets

A
  1. Network
  2. Services
  3. Telecommunications
  4. System/Application
  5. Personnel/User Domain
  6. Computing devices
  7. Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phases of a Security Lifecycle

A
  1. identify
  2. prevent
  3. detect
  4. respond
  5. recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities

A

IDENTIFY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

safeguards to ensure delivery of critical infrastructure services

A

Prevent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

activity to identify the occurrence of a cybersecurity event.

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

activities to take action regarding a detected cybersecurity event

A

RESPOND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event

A

RECOVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disciplines Contributing
To Information Security

A
  1. Business
  2. Economics
  3. Education
  4. Law
  5. Mathematics
  6. Psychology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

appreciating the organisational context in which the protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.

A

Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment

A

Economics

16
Q

supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community

A

Education

17
Q

recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced

A

Law

18
Q

providing the underpinnings for a variety of security techniques, including cryptography and access control.

A

Mathematics

19
Q

helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response

A

Psychology

20
Q

Three types of users

A
  1. malicious users,
  2. untrained users,
  3. careless user
21
Q

Weakest Link in the Security of an
IT Infrastructure

A
  1. user
  2. human error
  3. common threats
22
Q

is considered to be the weakest link in information security.They are malicious users, untrained users, and careless users

A

USER

23
Q

hacking and phishing and malware threats such as viruses, worms and Trojan horses

A

COMMON THREATS

23
Q

is a major risk and threat to any organization

A

HUMAN ERROR

24
Q

Related Areas supported by security

A
  1. Artificial Intelligence
  2. System Analysis and Design
  3. Software Engineering
  4. Networking
  5. Computer Science
  6. Human Computer Interaction
  7. Database
25
Q

AI techniques have significant potential to aid security technologies and decision processes, need to be secure against compromise, given the increasing trust and reliance that is placed on them

A

ARTIFICIAL INTELLIGENCE

26
Q

Given that database technologies are often used to store the most valuable asset (the data), the security considerations here include preventing unauthorised disclosure and modification of the stored data,

A

DATABASE

27
Q

Systems that are designed and implemented without taking their users into account can often end up causing mistakes, which in turn could compromise security

A

HUMAN COMPUTER INTERACTION

28
Q

data is sent over the network, and the network connections seeking to protect, it is important to consider the security at the networking level in terms of protecting data in transit and controlling the permitted connectivity between the end-systems and devices

A

NETWORKING

29
Q

Recognising that many vulnerabilities can also occur as a result of the way code was written rather than a fundamental design flaw

A

SOFTWARE ENGINEERING

29
Q

Security needs to be considered within the specification and design of new systems, such that it is recognised and incorporated from the outset rather than needing to be retrofitted at a later stage

A

SYSTEMS ANALYSIS AND DESIGN

30
Q

Impacts on Security Breach

A
  1. disclosure
  2. denial of access
  3. modification
  4. destruction
31
Q

data is disclosed to an unauthorized party.

A

Disclosure

31
Q

data is changed as a result of the breach.

A

Modification

32
Q

data, or a system containing it, becomes unavailable.

A

Denial of Access

33
Q

data is lost as a result of the breach

A

Destruction

34
Q

9 Steps for Information
Risk Management Regime

A
  1. Secure Configuration
  2. Network Security
  3. Managing User Privileges
  4. User Education and Awareness
  5. Incident Management
  6. Malware Prevention
  7. Monitoring
  8. Removable Media Controls
  9. Home and Mobile Working