Module 3: L3 Flashcards

1
Q

A completely “secure” system example: write info on paper, read it, burn paper, and scatter the ashes. What’s the problem here?

A

This is secure but useless. Protected info must remain available to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The role of preventing and recovering data leads to…(2pts)…which leads to…(2pts)

A
  • Enhanced monitoring and more security controls
  • Interference with work and delays of info usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the acronym CIA?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security involves adaptability. Conditions can change such as (3pts)…?

A
  1. Evolving external threats
  2. Changes in technology
  3. Internal changes of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security implementation has costs. What are 3x mentioned in the lecture?

A
  1. Takes time
  2. Requires human and financial resources
  3. Little to none short term contribution to output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Changes in user tasks…(3 words)

A

challenge security parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User perception of security effectiveness is based on (4pts)…?

A
  1. Worker skill level
  2. General IS support
  3. Degree of interference w/ work
  4. Detection of organizational fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of security hindrances? (4x mentioned)

A
  1. Lost pws
  2. Inability to access info
  3. Additional steps to perform tasks
  4. System slowdowns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two MAIN types of security hindrances?

A
  1. Interference with work processes
  2. System slowdowns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Smart” use of IT applies to productivity as well as ________ ___________.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security effectiveness is greater if…(2pts)?

A
  1. Fraud has been detected and reported
  2. More security notices are circulated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security hindrances are more or less likely if…(3pts)?

A
  1. Less likely for more experienced workers
  2. More likely if fraud detected
  3. More likely if more security notices are circulated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly