Information Assurance 2 Flashcards

1
Q

The act of protecting data
from being observed by any
unauthorized persons.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of maintaining and
assuring the accuracy and
completeness of data
over
its entire lifecycle

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The act in which Information is accessible by
authorized users whenever they request the
information

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to
protect the cyber environment and organization and user’s assets

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is all about protecting data that is found in electronic form.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

KEY PRINCIPLES OF
INFORMATION SECURITY

A
  1. confidentiality
  2. integrity
  3. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organization and User’s Assets

A
  1. Network
  2. Services
  3. Telecommunications
  4. System/Application
  5. Personnel/User Domain
  6. Computing devices
  7. Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phases of a Security Lifecycle

A
  1. identify
  2. prevent
  3. detect
  4. respond
  5. recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

developing the organisational understanding to manage cybersecurity risk to systems, assets, data and capabilities

A

IDENTIFY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

safeguards to ensure delivery of critical infrastructure services

A

Prevent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

activity to identify the occurrence of a cybersecurity event.

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

activities to take action regarding a detected cybersecurity event

A

RESPOND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

maintaining plans for resilience and restoring any capabilities or services impaired due to a cybersecurity event

A

RECOVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disciplines Contributing
To Information Security

A
  1. Business
  2. Economics
  3. Education
  4. Law
  5. Mathematics
  6. Psychology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

appreciating the organisational context in which the protection is required and the importance of security in terms of areas such as maintaining brand reputation, supporting business continuity and minimising business risk.

A

Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

understanding the value of security controls relative to costs of exposure and linking to factors such as return on (security) investment

16
Q

supporting areas such as user awareness and training, each being steps towards the boarder goal of achieving a security culture amongst the staff community

17
Q

recognising the laws that require us to preserve security, and those relevant in a response to incidents, as well as linking to criminology in relation to understanding the nature and motivation of some of the attackers that may be faced

18
Q

providing the underpinnings for a variety of security techniques, including cryptography and access control.

A

Mathematics

19
Q

helping us to understand how users perceive issues such as security and trust, as well as predicting how users may behave in risk scenarios and the factors that may influence their response

A

Psychology

20
Q

Three types of users

A
  1. malicious users,
  2. untrained users,
  3. careless user
21
Q

Weakest Link in the Security of an
IT Infrastructure

A
  1. user
  2. human error
  3. common threats
22
Q

is considered to be the weakest link in information security.They are malicious users, untrained users, and careless users

23
Q

hacking and phishing and malware threats such as viruses, worms and Trojan horses

A

COMMON THREATS

23
is a major risk and threat to any organization
HUMAN ERROR
24
Related Areas supported by security
1. Artificial Intelligence 1. System Analysis and Design 1. Software Engineering 1. Networking 1. Computer Science 1. Human Computer Interaction 1. Database
25
AI techniques have significant potential to aid security technologies and decision processes, need to be secure against compromise, given the increasing trust and reliance that is placed on them
ARTIFICIAL INTELLIGENCE
26
Given that database technologies are often used to store the most valuable asset (the data), the security considerations here include preventing unauthorised disclosure and modification of the stored data,
DATABASE
27
Systems that are designed and implemented without taking their users into account can often end up causing mistakes, which in turn could compromise security
HUMAN COMPUTER INTERACTION
28
data is sent over the network, and the network connections seeking to protect, it is important to consider the security at the networking level in terms of protecting data in transit and controlling the permitted connectivity between the end-systems and devices
NETWORKING
29
Recognising that many vulnerabilities can also occur as a result of the way code was written rather than a fundamental design flaw
SOFTWARE ENGINEERING
29
Security needs to be considered within the specification and design of new systems, such that it is recognised and incorporated from the outset rather than needing to be retrofitted at a later stage
SYSTEMS ANALYSIS AND DESIGN
30
Impacts on Security Breach
1. disclosure 2. denial of access 3. modification 4. destruction
31
data is disclosed to an unauthorized party.
Disclosure
31
data is changed as a result of the breach.
Modification
32
data, or a system containing it, becomes unavailable.
Denial of Access
33
data is lost as a result of the breach
Destruction
34
9 Steps for Information Risk Management Regime
1. Secure Configuration 1. Network Security 1. Managing User Privileges 1. User Education and Awareness 1. Incident Management 1. Malware Prevention 1. Monitoring 1. Removable Media Controls 1. Home and Mobile Working