Introduction to Information Security and Secure Programming Flashcards

1
Q

an asset to all individuals and businesses

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the protection of these assets in order to achieve CIA

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the processes and methodologies which are designed and implemented

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C in CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I in CIA

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A in CIA

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information kept private and secure

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data not modified, deleted or added

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Systems available to whom requires them

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act in which a subject attempts to verify/prove their claims to a given identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of granting an authenticated subject the proper access rights to different assets

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Actions should be traceable to a specific subject to allow information to be useful

A

Audit Trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any item, tangible or intangible, with value to an organization

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

anything whose loss can cause disruption to an organization

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

weakness or flaw that may be accidentally or intentionally triggered leading to the violation of security policies

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an action or event that may potentially compromise or violate security

17
Q

the occurrence upon realization of a violation of security

18
Q

the outcome when a violation of security has been realized

19
Q

defined as the potential loss of an asset when a threat is realized

A

Exposure factor

20
Q

the probability that a particular threat directed towards a specific vulnerability will occur

21
Q

refers to the process reducing risks to acceptable levels

A

Risk Management

22
Q

Mechanisms by which threats can be mitigated

A

Security Controls

23
Q

The process of solving customers’ problems by the systematic development and evolution of large, high-quality software systems within cost, time and other constraints

A

Software Engineering

24
Q

encapsulates functionality and represents data in a structured manner

25
Also called presentation layer
View
26
Contains the application or business logic needed to process user data
Controller