IS4550 CHAPTER 1 Flashcards
The process of determining the identity of an individual or device is called ___.
AUTHENTICATION
Ensuring accessibility of information to authorized users when required is called ___.
AVAILABILITY
A management technique used to improve the efficiency and effectiveness of a process within an organization is called ___.
BUSINESS PROCESS REENGINEERING (BPR)
Limiting access to information/data to authorized users only is called ___.
CONFIDENTIALITY
An ad hoc, ongoing effort to improve business products, services, or process is called ___.
CONTINUOUS IMPROVEMENT
The state of data stored on any type of media is called ___.
DATA AT REST
The state of data when traveling over or through a network is called ___..
DATA IN TRANSIT
The act of managing implementation and compliance with organizational policies is called ___.
GOVERNANCE
The parameters within which a policy, standard, or procedure recommended when possible but are optional is called ___.
GUIDELINE
The implementation of controls designed to ensure confidentiality, integrity, availability, and non-repudiation is called ___.
INFORMATION ASSURANCE
The act of protecting information systems or IT infrastructures from unauthorized use, access, disruption, or destruction is called ___.
INFORMATION SYSTEMS SECURITY (ISS)
The five-phase management process of controlling the planning, implementation, evaluation, and maintenance of information systems security is called ___.
INFORMATION SYSTEMS SECURITY MANAGEMENT LIFE CYCLE
The act of ensuring that information has not been improperly changed is called ___.
INTEGRITY
A principle that restricts information access to only those users with an approved and valid requirement is called ___.
NEED TO KNOW
The concept of applying technology in way that an individual cannot deny or dispute they were part of a transaction is called ___.
NONREPUDIATION