Prelim Lesson 1 Flashcards

1
Q

is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

timely, reliable access to data and information services for authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

timely, reliable access to data and information services for authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protection against unauthorized modification or destruction of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

assurance that information is not disclosed to unauthorized persons

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security measures to establish the validity of a transmission, message,
or originator

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

assurance that the sender is provided with proof of a data delivery
and recipient is provided with proof of the sender’s identity, so that neither can later deny
having processed the data

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: IT security cannot be accomplished in a
vacuum, because there are a multitude of dependencies and interactions
among all four security engineering domains.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

protection of hardware, software, and data
against physical threats to reduce or prevent disruptions to operations and
services and loss of assets

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliabilit

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliability

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves the implementation of standard operational
security procedures that define the nature and frequency of the interaction
between users, systems, and system resources,

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to this, a
computing environment is made up of five continuously interacting
components

A

Raggad’s taxonomy of information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Includes information security and computer

A

IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

According to them, IA can be thought of as protecting
information at three distinct levels

A

Blyth and Kovacich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data and data processing activities in physical space;

20
Q

information and data manipulation abilities
in cyberspace

A

Information Infractrature

21
Q

information and data manipulation abilities
in cyberspace;

A

Information infrastracture

22
Q

knowledge and understanding in human decision space

A

Perceptual

23
Q

The flip side of information assurance

A

Information warfare

24
Q

Offensive part of IW

A

Information operations

25
Defensive part of IW
Information Assurance
26
in military circles, Type 1 is also called
Truth Projection
27
Involves managing an opponent's perception through deception and psychological operations
Type 1
28
involves denying, destroying,degrading, or distorting the opponent's information flows to disrupt their ablitity to carry out or coordinate operations
Type II
29
gathers intelligence by exploiting the opponent's use of information systems
Type III
30
consists of employees, former employees and contractors.
Insiders
31
: one who gains unauthorized access to or breaks into information systems for thrills, challenge, power, or profit
Hackers
32
target information that may be of value to them: bank accounts, credit card information, intellectual property, etc.
Criminals
33
actively seek intelligence about competitors or steal trade secrets.
Corporations
34
seek the military, diplomatic, and economic secrets of foreign governments, foreign corporations, and adversaries. May also target domestic adversaries.
Governments and agencies
35
usually politically motivated and may seek to cause maximal damage to information infrastructure as well as endanger lives and property.
Terrorists
36
timely attack detection and reporting is key to initiating the restoration and response processes
Attack Detection
37
-relies on established procedures and mechanisms for prioritizing restoration of essential functions. -may rely on backup or redundant links, information system components, or alternative means of information transfe
Capability restoration
38
: the items being protected by the system (documents, files, directories, databases, transactions, etc.)
objects
39
: entities (users, processes, etc.) that execute activities and request access to objects.
subjects
40
operations, primitive or complex, that can operate on objects and must be controlled
actions
41
authorized users are able to access it
availability
42
the information is free of error and has the value expected;
accuracy
43
the information is genuine
authenticity
44
the information has not been disclosed to unauthorized parties
confidentiality
45
the information is whole, complete and uncorrupted;
integrity
46
the information has value for the intended purpose;
utility
47