Lesson 1 Flashcards

(51 cards)

1
Q

Where the history of information security begins.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of protecting information and its critical elements by mitigating risks; a part of information risk management.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When did computer security begin?

A

Computer security began immediately after the first mainframes were developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHEN: Department of Defense’s Advanced Research Project Agency (ARPA); feasibility of redundant networked communications.

A

1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHEN: Popularity and misuse of ARPANet grew and had two (2) fundamental security problems.

A

1970s & 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What were the two (2) fundamental security problems experienced by the popularity of ARPANET during the 1970s & 1980s?

A

No safety procedures for dial-up communication to the ARPANET.
User identification and authorization were non-existent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHEN: The microprocessor expanded computing capabilities and security threats.

A

Late 1970s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who developed the ARPANET project during the 1960s?

A

Larry Roberts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When was the ARPANET Program Plan released?

A

June 3, 1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where information security and the study of computer security began.

A

R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What was the scope of R-609? (4)

A

Physical Security
Data Safety
Limited unauthorized access to data.
Involvement of personnel from multiple organization levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHEN: Computer networks grew prevalent; the internet was commercialized.

A

1990s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHEN: The internet became a medium of thousands of communication; security is reliant; everyone is vulnerable.

A

2000s to Present Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The state of being secure, to be free from danger, and or be protected from adversaries; a balance of protection and availability.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the multiple layers of security? (5)

A

Physical Security
Personal Security
Operations Security
Communications Security
Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To manipulate or modify another subject.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The resource being safeguarded.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Can harm information and the system that supports it.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The mechanisms used to counter assaults.

A

Control / Safeguard / Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The act of compromising a system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A condition of state.

22
Q

A single instance of an information asset being damaged in an illegal manner.

23
Q

A collection of controls and protections.

A

Protection Profile / Security Posture

24
Q

The likelihood for something unfavorable to happen.

25
The tool used for an attack (subject); target (object).
Subjects & Objects
26
A group of items, people, or other entities that pose a ____ to an asset; represents a constant danger to an asset.
Threats
27
A specific instance of a threat; damages or steals information.
Threat Agent
28
A flaw or weakness in the system that allows damage.
Vulnerability
29
What are the values involved in the CIA Triad? (8)
Confidentiality Integrity Availability Accuracy Authenticity Phishing Utility Possession
30
A core concept of the CIA Triad that is closely tied to privacy.
Confidentiality
31
What are the components of an information system? (6/7)
Software Hardware Data People Procedures Networks Laptop Thefts…?
32
Security from grass-roots effort, technical expertise of individual admins; seldom works; lack of participant support and organizational staying power.
Bottom-up Approach
33
Initiated by upper management; has strong upper management support, a dedicated champion, dedicated funding, clear planning, and the chance to influence organizational culture.
Top-down Strategy
34
Supports specialized implementations of a security project; a coherent program rather than a series of random actions.
Security Systems Development Life Cycle (SecSDLC)
35
The Security Systems Development Life Cycle (SecSDLC)  can be... (2)
Event-driven Plan-driven
36
A SecSDLC that serves as a response to an occurrence.
Event-driven
37
A SecSDLC that serves as a result of an implementation strategy.
Plan-driven
38
What are the phases of the SecSDLC? (6)
1 | Investigation 2 | Analysis 3 | Logical Design 4 | Physical Design 5 | Implementation 6 | Maintenance & Change
39
Create blueprints for security
Logical Design & Physical Design
40
The senior technology officer.
Chief Information Officer
41
Also referred to as the Manager for Security, the Security Administrator, or a similar title.
Chief Information Security Officer
42
Individuals experienced in one or multiple requirements of technical and non-technical areas.
Information Security Project Team
43
An Information Security Project Team is usually composed of... (7)
Champion Team Leader Security Policy Developers Risk Assessment Specialists Security Professionals Systems Administrators End Users
44
The weakest link in the security chain.
End Users
45
Responsible for the security and use of a particular set of information.
Data Owner
46
Responsible for the storage, maintenance, and protection of information.
Data Custodian
47
The end systems users who work with the information.
Data Users
48
What are the communities of interest of an Information Security Project Team? (3)
Information Security Management & Professionals Information Technology Management & Professionals Organizational Management & Professionals
49
No hard and fast rules, nor many universally accepted solutions, no magic user’s manual, complex levels of interactions.
Security as Art
50
Dealing with technology designed to perform at high levels of performance, specific conditions cause actions, faults can be resolved with sufficient time.
Security as Science
51
Examines the behavior of individuals interacting with the systems.
Security as Social Science