Physical & Information Security Flashcards

1
Q

Process by which an organization protects the creation, collection, storage, use, transmission and disposal of information.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of verifying the identity of an individual user, machine, software component or any other entity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Something a person is, something a person knows or something a person has.

A

Authentication Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Method to verify an identity using one type of authentication factor.

A

Single-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Method to verify an identity using two or more types of authentication factors.

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use of different controls at different points in a transaction process.

A

Layered Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the authentication factor represented by a biometric characteristic, such as a fingerprint or iris pattern.

A

Something a Person Is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the authentication factor represented by a password or PIN.

A

Something a Person Knows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the authentication factor represented by an ATM/debit card, smart card or token.

A

Something a Person Has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Challenge questions that do not rely on information that is publicly available.

A

Out-of-Wallet Questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technique used to establish a “fingerprint identity” of a user’s computer or other web access device.

A

Device Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication technique that uses one-time cookies, PC configuration, IP address, geo-location and other factors.

A

Complex Device Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A data security technique that encodes information so that data appears as a meaningless string of letters and symbols during delivery or transmission.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disposal technique used to destroy sensitive, electronic data on devices by replacing it with new, random data.

A

Overwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disposal technique using powerful, varying magnetic fields to scramble data recorded on media.

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two main types of access control.

A

(1) Physical access control, (2) Logical access control

17
Q

Access control that limits access to buildings, rooms and physical IT assets.

A

Physical Access Control

18
Q

Access control that limits connections to computer networks, system files and data.

A

Logical Access Control

19
Q

Security technique used to regulate who or what can view or use resources in a computing environment.

A

User Access Controls

20
Q

A weakness in automated system security procedures, administrative controls, physical layout, internal controls, etc., that could be exploited to gain unauthorized access to information or to disrupt critical processing.

A

Vulnerability

21
Q

Systematic examination of an information system or product to determine the adequacy of security measures and identify security deficiencies.

A

Vulnerability Analysis

22
Q

Systematic examination of systems to identify, quantify and prioritize the security deficiencies of the systems.

A

Vulnerability Assessment