Physical & Information Security Flashcards

13%

1
Q

What are audit trails?

A

The complete history kept of transaction data and of all changes to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three key components of information security?

A

Confidentiality, data integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cyber attack?

A

An attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a data loss prevention (DLP) program?

A

A comprehensive approach (covering people, processes, and systems) of implementing policies and controls designed specifically to discover, monitor, and protect confidential data wherever it is stored, used, or in transit over the network and at the perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IT strategic plan?

A

A comprehensive blueprint that guides the organization’s technology management and contains high-level goals and plans for all areas of information technology that affect the business, not just the infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an official record?

A

Any form of paper, electronic, audio or video recording, etc., that an organization must retain for legal, regulatory, or practical operational reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is business email compromise (BEC)?

A

BEC occurs when a legitimate business’ email account is either compromised or impersonated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is confidentiality?

A

When information is not made available or disclosed to unauthorized individuals, entities, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data integrity?

A

The process of maintaining and assuring the accuracy and completeness of data over its life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is file accountability?

A

Ensuring that in each step of a process only current files are processed and to ensure a file is not inadvertently duplicated or omitted from processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is file balancing?

A

A process completed at each step to ensure that transactions were not dropped, changed, or duplicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is layered security?

A

The use of different controls at different points in a transaction process so that weakness in one control is generally compensated for by the strength of a different control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is limited access?

A

Restricting data access to authorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is nonpublic personal information?

A

Any personally identifiable information a financial institution collects about an individual in connection with providing a financial product or service, unless that information is otherwise publicly available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is public information?

A

Information lawfully made available to the general public from government records, widely distributed media, or legally required disclosures to the general public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is redundancy?

A

Data backed up at a site physically separate from the data processing area, to guard against the loss or destruction of data

17
Q

What is secure storage?

A

Protecting electronic files and paper records against unauthorized or inadvertent change through the use of file security techniques

18
Q

What is the National Institute of Standards and Technology (NIST)?

A

The agency that developed a voluntary cybersecurity framework based on existing standards, guidelines, and practices for reducing cyber risks to critical infrastructures

19
Q

Who are internal IT audit staff?

A

The department whose primary role is to assess, independently and objectively, the controls, reliability, and integrity of the institution’s IT environment

20
Q

What is authentication?

A

The process of confirming the identity of a person, an object, or a piece of information

21
Q

What is information security?

A

The protection of information against unauthorized access to or modification whether in storage, processing, or transit, and against the denial of service to authorized users, including what is necessary to detect, document, and counter such threats

22
Q

What is change management?

A

The broad processes for managing organizational changes that encompass planning, oversight or governance, project management, testing, and implementation.

23
Q

What is end-point security?

A

A method of protecting a network when accessed with remote devices, such as laptops, or other wireless and mobile devices

24
Q

What is middleware?

A

Software that connects two or more software components or applications, aka application programmer interface (API)

25
Q

What is a software patch?

A

Code that replaces or updates other code, and is frequently used to correct security flaws

26
Q

What is a sandbox?

A

It is a restricted, controlled execution environment often used for testing new programs that prevents potentially malicious software, such as mobile code, from accessing any system resources

27
Q

What is a secure sockets layer (SSL)?

A

A protocol that is used to transmit private documents through the internet

28
Q

What is a zero-day attack?

A

An attack on a piece of software that has a vulnerability for which there is no known patch