Lesson 1 Flashcards

1
Q

ISO stands for…?

A

INTERNATIONAL STANDARD ORGANIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IEC stands for…?

A

INTERNATIONAL ELECTROTECHNICAL COMMISSION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All aspects of system quality?(5)

A
  • Functionality
  • Usability
  • Reliability
  • Performance
  • Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the study of how to
protect your information assets from destruction, degradation, manipulation and exploitation.

A

INFORMATION ASSURANCE(IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Basic Security Issues?(5)

A
  • Availability
  • Integrity
  • Confidentiality
  • Authentication
  • Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

timely, reliable access to data and information services for
authorized users.

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

protection against unauthorized modification or destruction of
information.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

assurance that the information is not disclosed to unauthorized person.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

security measures to establish the validity of a transmission, message or originator.

A

AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

assurance that the sender is provided with proof of a
data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data.

A

NON-REPUDIATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to ____ , IA should be viewed as spanning
four security engineering domains.

A

DEBRA HERRMANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Four Security Engineering Domains?(4)

A
  • Physical Security
  • Personnel Security
  • IT Security
  • Operational Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to the protection of hardware, software, and data against physical threats.

A

PHYSICAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration.
And unavailability of an organization’s logical and physical assets.

A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the inherent technical features and functions that collectively contribute to an IT infrastructure.

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

involves the implementation of standard operational security that define the nature and frequency of the interaction between users, systems and system resources.

A

Operational Security

17
Q

According to ____ of information security, a computing environment is made up of five continuously interacting components.

A

Raggad’s Taxonomy

18
Q

The five continuously interacting components?(5)

Possible Question? or not.

A
  • Activities
  • People
  • Data
  • Technology
  • Networks

According to Raggad’s Taxonomy