Midterm Flashcards

1
Q

C.I.A stands for…?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it offers a high level of assurance that data, objects, or resources are restricted from unauthorized subjects.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality and integrity depend on each other. Without object integrity, confidentiality cannot be maintained.
True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Aspects of Confidentiality (8)

A
  1. Sensitivity
  2. Discretion
  3. Criticality
  4. Concealment
  5. Secrecy
  6. Privacy
  7. Seclusion
  8. Isolation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to the quality of information, which could cause harm or damage if disclosed. Maintaining confidentiality of sensitive information helps to prevent harm or damage.

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.

A

Discretion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information.

A

Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the act of hiding or preventing disclosure.
is viewed as a means of cover, obfuscation, or distraction.

A

Concealment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the act of keeping something a secret or preventing the disclosure of information.

A

Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involves storing something in an out-of-the-way location. This location can also provide strict access controls. Can help enforcement confidentiality protections.

A

Seclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the act of keeping something separated from others.
Can be used to prevent commingling of information or disclosure of information.

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it offers a high level of assurance that the data, objects, and resources are unaltered from their original protected state.
Alterations should not occur while the object is in storage, in transit, or in process.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity can be examined from three perspectives: (3)

possible question? Not sure

A
  1. Preventing unauthorized subjects from making modifications.
  2. Preventing authorized subjects from making unauthorized modifications, such as mistakes
  3. Maintaining the internal and external consistency of objects so that their data is a correct and true relection of the real world.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authorized subjects are granted timely
and uninterrupted access to objects.
Includes efficient uninterrupted access to objects and prevention of denial-of-service (DoS) attacks.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Other Security Concepts (6 ,by order)

A
  1. Identification
  2. Authentication
  3. Authorization
  4. Auditing
  5. Accountability
  6. Nonrepudiation
16
Q

is the process by which a subject professes an identity and accountability is initiated.

A

Identification

17
Q

The process of verifying or testing that the claimed identity is valid.
Requires from the subject additional information that must exactly correspond to the identity indicated.

A

Authentication

18
Q

Once a subject is authenticated, access must be authorized.

A

Authorization

19
Q

or monitoring, is the programmatic means by which a subject’s actions are tracked and recorded for the purpose of holding the subject accountable for their actions while authenticated on a system.

A

Auditing

20
Q

relies on the capability to prove a subject’s identity and track their activities.

A

Accountability

21
Q

ensures that the subject of an activity or event cannot deny that the event occured.

A

Nonrepudiation

22
Q

Protection Mechanisms: (3)

A
  1. Layering
  2. Abstraction
  3. Data Hiding
23
Q

also known as defense in depth, is simply the use of multiple controls in a series.
Using a multilayered solution allows for numerous, different controls to guard against whatever threats come to pass.

A

Layering

24
Q

is used for efficiency. Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective.

A

Abstraction

25
Q

preventing data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.

A

Data Hiding

26
Q

Types of Copoporate Plans that should include the IT security (3):

A
  1. Strategic Plan
  2. Tactical Plan
  3. Operational Plan
27
Q

is a long-term plan that is fairly stable. Also serves as the planning horizon.

A

Strategic Plan

28
Q

is a midterm plan developed to provide more details on accomplishing the goals set forth in the strategic plan or can be crafted ad-hoc based upon unpredicted events.

A

Tactical Plan

29
Q

is a short-term, highly detailed plan based on the strategic and tactical plans. It is valid or useful only for a short time.

A

Operational Plan