Lesson 1 Flashcards
What is information security?
Information security refers to the policies, procedures, and technical measures that can be applied to prevent unauthorised use, modication and theft to computer based resources, such as hardware, software and data.
Why is information security important?
In today’s high technology environment, organisations are becoming more and more dependent on their information systems
What are the three basic information security concepts?
1) Confidentiality
2) Integrity
3) Availability
You visit an organisation’s website and you realised that you are able to view sensitive files on their web server. Even though it is not your fault, it is still considered an information security breach.
A. True
B. False
A. True
Since you were not allowed to access sensitive files
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
A. Authenticity
B. Integrity
C. Confidentiality
D. None of the above
A. Authenticity
List the three stages in plan-protect-respond cycle
Planning, protection and response
In plan, protect and response cycle, which stage consumes the most time?
Protection
How is protection defined?
Protection is defined as the plan-based creation of operation and countermeasures.
How is response defined?
Response is defined as recovery according to plan.
Why is there a need to understand Threat Environment?
To know how the attacks are going to attack us, and thus how to defend our systems.
The changing nature of information security attacks is more common than the traditional attacks.
A. True
B. False
A. True
Automation, speed and action at distance are encouraging online attacks
A. True
B. False
A. True
The chances of getting punished is low as well.
Most obvious reason(s) for computer security attacks is (are):
Privacy violations,
Criminal attacks,
Publicity attacks,
Legal attacks
The fabrication of information that is purported to be from someone who is not actually the author is called:
Masquerading
(taking someone else’s identity)
The interruption or degradation of a data service or information access is called
Could be due to traffic of any other reason
Denial of service