IS3350 CHAPTER 1 Flashcards
Management and regulatory controls are usually policies, standards, guidelines, and procedures. They can also be the laws an organization must follow. This is called ___.
ADMINISTRATIVE SAFEGUARDS
The security goal of ensuring that you can access information systems and their data when you need them. They must be available in a dependable and timely manner. This is called ___.
AVAILABILITY
The designs, blueprints, or plans that make an organizations product or service unique is ___.
COMPETITIVE EDGE
The security goal of ensuring that only authorized persons can access information systems and their data. This is called ___.
CONFIDENTIALITY
Any protective action that reduces information security risks. These actions may eliminate or lesson vulnerabilities, control threats, or reduce risk. Safeguards is another term for controls. This is called ___.
CONTROL
The science and practice of hiding information so that unauthorized persons can’t read it is called ___.
CRYPTOGRAPHY
Attack that disrupts information systems so that they’re no longer available to users is called ___.
DENIAL OF SERVICE (DoS) ATTACK
A successful attack against a vulnerability is called ___.
EXPLOIT
An attacker that has no current relationship with the organization they’re attacking is called ___.
EXTERNAL ATTACKER
Intelligence, knowledge, and data. You can store information in paper or electronic form is called ___.
INFORMATION
The study and practice of protecting information. The main goal of information security is to protect its confidentiality, integrity, and availability is called ___.
INFORMATION SECURITY
The security goal of ensuring that no changes are made to information systems and their data without permissions is called ___.
INTEGRITY
An attacker that has a current relationship with the organization he or she is attacking. It can be an angry employee. This is called ___.
INTERNAL ATTACKER
A rule that systems should run with the lowest level of permissions needed to complete tasks. This means users should have the least amount of access needed to do their jobs is called ___.
LEAST PRIVILEGE
This term refers to any software that performs harmful, unauthorized , or unknown activity and is called ___.
MALWARE
A physical security safeguard that controls entry into a protected area. This entry method has two sets of doors on either end of a small room and is called ___.
MANTRAP
This is a rule that users should have access to only the the information they need to do their jobs and called ___.
NEED TO KNOW
A piece of software or code that fixes a programs’ security vulnerabilities. These are available for many types of software, including operating systems and is called ___.
PATCH
Controls keep unauthorized individuals out of a building or other controlled areas. You can also use these to keep unauthorized individuals from using an information system. This is called ___.
PHYSICAL SAFEGUARD