Information Management CH6 Flashcards

1
Q

Briefly define each of the three members of the information security triad.

A

i. Confidentiality: we want to be able to restrict access to those who are allowed to see given information.
ii. Integrity: the assurance that the information being accessed has not been altered and truly represents what is intended.
iii. Availability: information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term authentication mean?

A

The process of ensuring that a person is who he or she claims to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is multi-factor authentication?

A

The use of more than one method of authentication. The methods are: something you know, something you have, and something you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is role-based access control?

A

With role-based access control (RBAC), instead of giving specific users access rights to an information resource, users are assigned to roles and then those roles are assigned the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of encryption?

A

To keep transmitted data secret so that only those with the proper key can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two good examples of a complex password?

A

a. There are many examples of this. Students need to provide examples of passwords that are a minimum of eight characters, with at least one upper-case letter, one special character, and one number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pretexting?

A

Pretexting occurs when an attacker calls a helpdesk or security administrator and pretends to be a particular authorized user having trouble logging in. Then, by providing some personal information about the authorized user, the attacker convinces the security person to reset the password and tell him what it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the components of a good backup plan?

A

Knowing what needs to be backed up, regular backups of all data, offsite storage of all backed-up data, and a test of the restoration process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a firewall?

A

A firewall can be either a hardware firewall or a software firewall. A hardware firewall is a device that is connected to the network and filters the packets based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term physical security mean?

A

Physical security is the protection of the actual hardware and networking components that store and transmit information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of encryption?

A
  1. Symmetric key encryption (two keys which are the same)

2. Public key encryption (two keys, of whom one is public and the other private)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four requirements of a backup plan

A
  1. Full understanding of organizational information resources
  2. Regular backup of data
  3. Offsite storage
  4. Test of data restoration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of firewalls?

A
Hardware firewall (attached to network)
Software firewall (runs on operating system)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IDS (Intrusion Detection System)

A

identifies if the system is under attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name some internal IT threats

A
  1. Intentional Malicious Behavior

2. Careless Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some external IT threats

A
  1. Intrusion threat
  2. Social engineering
  3. Phising
  4. Security weaknesses
  5. Backdoors
  6. Malicious code
  7. Viruses
17
Q

Name some examples of a malicious code

A
  1. Trojan Horses
  2. Worms
  3. Spyware
  4. Ransomware
  5. Denial of service attack (ddos)
18
Q

What is IT risk management?

A

The process of identifying and measuring information systems security risks

19
Q

Name three risk mitigation strategies

A
  1. Risk acceptance
  2. Risk reduction
  3. Risk transference