Lesson 1 Flashcards

1
Q

study of how to protect information from destruction, degradation, manipulation, and exploitation, and also how to recover it

A

information assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

timely, reliable access to data and information for authorized users

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the aspects of information needing protection

A

availability, integrity, confidentiality, authentication, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

protection against unauthorized modification of information

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of sender’s identity

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

assurance that information is not disclosed to unauthorized persons

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

four major categories of information assurance

A

physical security, personnel security, it security, operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

give examples of proper practice of information assurance

A

hard to guess passwords
encrypting hard drives
locking sensitive documents
assigning security clearances to staffers
using SSL for data transfers
having off-site backup of documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does SSL mean

A

secure socket layer protocol; websites that are safe or have https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protection of hardware, software, and data against physical threats to prevent loss of assets

A

physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

variety of ongoing measures taken to reduce the likelihood and severity of accidents

A

personnel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

inherent technical features and functions that collectively contribute to an IT infrastructure

A

IT security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

involves the implementation of standard operational security procedures

A

operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the objective of operational security is to

A

achieve a known secure system state at all times
prevent accidental or intentional theft, release destruction, alteration, misuse, or sabotage of system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

according to raggad’s taxonomy of information security, what are the five interacting components in a computing environment

A

activities, people, data, technology, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

desired effect: to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

three levels of information security

A

physical, information infrastructure, perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

attacker’s operation: physical attack and destruction–electromagnetic attack, visual spying, intrusion, scavenging and removal, wiretapping, interference, eavesdropping

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

defender’s operation: COMPSEC, COMSEC, ITSEC, OPSEC

A

physical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

covers information and data manipulation ability maintained in cyberspace

A

infrastructure level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

desired effects: influence the effectiveness and performance of information functions

A

infrastructure level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

attackers operations: impersonation, piggybacking, spoofing, network attacks, malware, authorization attacks, active misuse, and denial of service

A

infrastructure level

20
Q

defender’s operation: encryption and key management, intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and standards

A

infrastructure level

21
Q

perceptual level is also called

A

social engineering

22
desired effects: to influence decisions and behaviors
desired effects: to influence decisions and behaviors
23
defender’s operations: psychological testing, education, biometrics, watermarks, keys, passwords
perceptual level
24
attacker’s operations: deception, blackmail, bribery and corruption, social engineering, trademark and copyright infringement, defamation, diplomacy, creating distrust
perceptual level
25
flip side of information assurance
information warfare
26
info warfare - type 1
managing an opponent’s perception through psychological operations/truth projection
27
information warfare - type 2
denying, destroying, degrading, or distorting the opponent’s information flows to disrupt their ability to carry out operations
28
information warfare - type 3
gathers intelligence by exploiting the opponent’s use of information systems
29
gains unauthorized access to information systems for thrills, challenge, power, or profit
hackers
29
who are the offensive players int he world of IW
insiders, hackers, criminals, corporations, governments, terrorists
30
consists of employees
insiders
31
target information that may be of value to them
criminals
32
actively seek intelligence on competitors or steal trade secrets
corporations
33
politically motivated and may seek to cause maximal damage to information and infrastructure
terrorists
34
seek military, diplomatic, and economic secrets of foreign governments
governments
35
relies on established procedures and mechanisms for prioritizing restoration of essential functions
capability restoration
36
a resource being protected
asset
36
devices, computers, people
physical assets
37
logical assets
information, data, intellectual property
38
system assets
any software, hardware, data, administrative, physical, communications, or personnel resource
39
the items being protected by the system
objects
40
entities that execute activities and request access to objects
subjects
41
operations, primitive or complex, that can operate on objects must be controlled
actions
42
the information is free of error and has the value expected
accuracy
43
the information is genuine
authenticity
44
the information has not been disclosed to unauthorized parties
confidentiality
45
the information is whole, complete, and uncorrupted
integrity
46
the information has value for the intended purpose
utility
47
the data is under authorized ownership and control
possession
48
security measures to establish the validity of a transmission, message, or originator
authentication