Information Security Flashcards

1
Q

The practice of protecting information by mitigating information risks.

A

INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A part of information risk management.

A

INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collection of data that has a meaning.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processed and organized data

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collecting, storing, and processing data for providing information, knowledge, and digital products

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection against unauthorized modification or destruction of information.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Free from unauthorized manipulation of the system; intentional or accidental.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protecting something; digital(VPN, Firewall, Router)/ physical(building).

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The quality or state of being secure—to be free from danger.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Raw and unprocessed data

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Character of information

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lowest point / form

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A must 100% security but not 100% at all because of users

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reducing or lessening the attack of malwares

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Isolate or minimize the damage

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It includes protection of the integriry, availability, authenticity, non-repudation and confidentiality of user data

A

information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is best thought of a superset of information security (i.e umbrella term), and as the business outcome of information risk management.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How factual./real, how true or accurate, something reliable

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Quantity or state of being whole, complete, and uncorrupted. The integiry of information is exposed to corruption, damage, destruction, or other disruption of its authentic state

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Adding something

A

Integrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Proving your identity by using passwords

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(Authenticity)The Quality of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, transferred.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Verify if the person accessing is the owner.

A

Authentication

26
Q

Restricting access by keeping private

A

Confidentiality

27
Q

Privacy or secrecy, private info guarding

A

Confidentiality

28
Q

Preventing disclosure or exposure to unauthorized individuals or systems.

A

Confidentiality

29
Q

The quality or state of preventing disclosure or exposure to unauthorized individuals or systems.

A

Confidentiality

30
Q

It is addressed and sensitive data is protected by using a debit card with a PIN code. This PIN code makes sure that only authorized individuals will have access to financial account information.

A

CONFIDENTIALITY

31
Q

 The access of restricted data
 Providing something with proof
 Ex. In the given system, changing the info in the system. They can trace who changed it by the student user ID.

A

NON-REPUDIATION

32
Q

Keeping records of all ATM transfer and withdrawals in a user’s bank account; helps ensure that information is accurate and up-to-date.

A

integrity

33
Q

Available for public use and accessible at all times. This provides convenience and flexibility for users.

A

Availability

34
Q

CIA

A

Confidentiality, Integrity, Availability

35
Q

IA

A

Information Assurance

36
Q

ATM

A

Automated Teller Machine

37
Q

PIN

A

Personal Identification Number

38
Q

API

A

Application Programming Interface

39
Q

CISO

A

Chief Information Security Officer

40
Q

CTO

A

Chief Technology Officer

41
Q

CRO

A

Chief Risk Officer

42
Q

CSO

A

Chief Security Officer

43
Q
  • No hard fast rules nor many universally accepted complete solutions.
  • No manual for implementing security through entire system.
A

AS AN ART

44
Q
  • Dealing with technology designed to operate at high levels of performance.
  • Specific conditions cause virtually all actions that occur in computer systems.
  • Nearly every fault, security hole, and system malfunction are a result of interaction of specific hardware and software.
A

AS SCIENCE

45
Q
  • Social science examines the behavior of individuals interactions with systems.
  • Security begins and ends with the people that interact with the system.
  • Security administrators can greatly reduce levels of risk caused by end users, and create more acceptable and supportable security profiles.
A

AS SOCIAL SCIENCE

46
Q

Assigned for overall responsibility for information security

A

Executive Management

47
Q

Responsible for design, implementation, management, and review of the organizations security policies.

A

INFORMATION SYSTEM SECURITY PROFESSIONALS

48
Q

 System owners who have budgetary authority.

A

Data Owners

49
Q

 Function that has “custody” of the system.

A

Data Custodians

50
Q

Protect physical items

A

Physical Security

51
Q

protect indicidual / group

A

Personal Security

52
Q

protect the details of a parituclar operation

A

Operations Security

53
Q

protect an organiztations communication, media technology and content

A

Communications Security

54
Q

 The concept that individuals should have the right to own and have control over their data.
 It emphasized the importance of autonomy over one’s information rather than leaving it in the hands of corporation or third parties.

A

Data Ownership

55
Q

Individuals decide who can access their data and revoke access whenever they want.

A

Control

56
Q

Having the right to know how your data is used.

A

Transparency

57
Q

Shared data, corresponds to a reward for its value.

A

Compensation

58
Q
  • One of which is Cyder, empower users to take control their data.
  • Cyder is a browser extension that protects your privacy, blocking trackers, cookies, and ads.
A

Privacy Tools

59
Q
  • As technology advances, so does the need for better privacy laws, implementing privacy legislation sets standards and holds entities accountable for their privacy practices.
  • It must
    a. Set strict guidelines for data collection
    b. Give individuals greater control over their privacy, and
    c. Impose heavy fines on organizations that do not comply.
A

Privacy Legislation

60
Q
  • Decentralized – Shared information from one to another devices
  • Secured – Having uniqueness
  • Transparent – It is open for public use
A

Blockchain Technology