Physical& Information Security (2) Flashcards

1
Q

Information Security

A

Process by which an organization protects the creation, collection, storage, use, transmission and disposal of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Process of verifying the identity of an individual user, machine, software component or any other entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication Factor

A

Something a person is, something a person knows or something a person has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Single-Factor Authentication

A

Method to verify an identity using one type of authentication factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multifactor Authentication

A

Method to verify an identity using two or more types of authentication factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layered Security

A

Use of different controls at different points in a transaction process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Something a Person Is

A

Name the authentication factor represented by a biometric characteristic, such as a fingerprint or iris pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Something a Person Knows

A

Name the authentication factor represented by a password or PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Something a Person Has

A

Name the authentication factor represented by an ATM/debit card, smart card or token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Out-of-Wallet Questions

A

Challenge questions that do not rely on information that is publicly available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Device Identification

A

Technique used to establish a “fingerprint identity” of a user’s computer or other web access device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Complex Device Identification

A

Authentication technique that uses one-time cookies, PC configuration, IP address, geo-location and other factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

A data security technique that encodes information so that data appears as a meaningless string of letters and symbols during delivery or transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Overwriting

A

Disposal technique used to destroy sensitive, electronic data on devices by replacing it with new, random data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Degaussing

A

Disposal technique using powerful, varying magnetic fields to scramble data recorded on media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(1) Physical access control, (2) Logical access control

A

Two main types of access control.

17
Q

Physical Access Control

A

Access control that limits access to buildings, rooms and physical IT assets.

18
Q

Logical Access Control

A

Access control that limits connections to computer networks, system files and data.

19
Q

User Access Controls

A

Security technique used to regulate who or what can view or use resources in a computing environment.

20
Q

Vulnerability

A

A weakness in automated system security procedures, administrative controls, physical layout, internal controls, etc., that could be exploited to gain unauthorized access to information or to disrupt critical processing.

21
Q

Vulnerability Analysis

A

Systematic examination of an information system or product to determine the adequacy of security measures and identify security deficiencies.

22
Q

Vulnerability Assessment

A

Systematic examination of systems to identify, quantify and prioritize the security deficiencies of the systems.