IS3340 CHAPTER 1 Flashcards
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind is called ___?
ADMINISTRATIVE CONTROL
Availability, Integrity, Confidentiality – goals of information security is called ___?
A-I-C TRIAD
Any person or program that attempts to interact with a computer information system in an unauthorized manner is called ___?
ATTACKER
Any person or program that possesses permission to access a resource is called ___?
AUTHORIZED USER
The assurance that requested information is available to authorized uses upon request is called?
AVAILABILITY
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions is called ___?
COMPUTER ENVIRONMENT
The assurance that information can only be accessed and viewed by authorized users is called ___?
CONFIDENTIALITY
A control that repairs the effects of damage from an attack. This includes virus removal procedures, firewall table updates, and user authorization database updates and is called ___?
CORRECTIVE CONTROL
A security strategy that relies on multiple layers of security that require attackers to defeat multiple controls to access any protected resource is called ___?
DEFENSE IN DEPTH
A control that detects when an action has occurred. This includes smoke detectors, log monitors, and system audits and is called ___?
DETECTIVE CONTROL
An agreement between the software producer and the end user. It addresses issues regarding approved use and liability. This is called ___?
END USER LICENSE AGREEMENT (EULA)
The practice of ensuring electronic information is safe from unauthorized use and accessible for authorized use is called ___?
INFORMATION SYSTEMS SECURITY
The assurance that information can be modified only by authorized users is called ___?
INTEGRITY
An alternate term for technical control is called ___?
LOGICAL CONTROL
Software that is designed to infiltrate a target computer and make it do something the attacker has instructed it to do is called ___?
MALICIOUS SOFTWARE