Prelim Lesson 1 Flashcards

1
Q

is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

timely, reliable access to data and information services for authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

timely, reliable access to data and information services for authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protection against unauthorized modification or destruction of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

assurance that information is not disclosed to unauthorized persons

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security measures to establish the validity of a transmission, message,
or originator

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

assurance that the sender is provided with proof of a data delivery
and recipient is provided with proof of the sender’s identity, so that neither can later deny
having processed the data

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: IT security cannot be accomplished in a
vacuum, because there are a multitude of dependencies and interactions
among all four security engineering domains.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

protection of hardware, software, and data
against physical threats to reduce or prevent disruptions to operations and
services and loss of assets

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliabilit

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliability

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves the implementation of standard operational
security procedures that define the nature and frequency of the interaction
between users, systems, and system resources,

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to this, a
computing environment is made up of five continuously interacting
components

A

Raggad’s taxonomy of information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Includes information security and computer

A

IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

According to them, IA can be thought of as protecting
information at three distinct levels

A

Blyth and Kovacich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data and data processing activities in physical space;

A

Physical

20
Q

information and data manipulation abilities
in cyberspace

A

Information Infractrature

21
Q

information and data manipulation abilities
in cyberspace;

A

Information infrastracture

22
Q

knowledge and understanding in human decision space

A

Perceptual

23
Q

The flip side of information assurance

A

Information warfare

24
Q

Offensive part of IW

A

Information operations

25
Q

Defensive part of IW

A

Information Assurance

26
Q

in military circles, Type 1 is also called

A

Truth Projection

27
Q

Involves managing an opponent’s perception through deception and psychological operations

A

Type 1

28
Q

involves denying, destroying,degrading, or distorting the opponent’s information flows to disrupt their ablitity to carry out or coordinate operations

A

Type II

29
Q

gathers intelligence by exploiting the opponent’s use of information systems

A

Type III

30
Q

consists of employees, former employees and contractors.

A

Insiders

31
Q

: one who gains unauthorized access to or breaks into
information systems for thrills, challenge, power, or profit

A

Hackers

32
Q

target information that may be of value to them: bank
accounts, credit card information, intellectual property, etc.

A

Criminals

33
Q

actively seek intelligence about competitors or steal trade
secrets.

A

Corporations

34
Q

seek the military, diplomatic, and economic
secrets of foreign governments, foreign corporations, and adversaries.
May also target domestic adversaries.

A

Governments and agencies

35
Q

usually politically motivated and may seek to cause maximal
damage to information infrastructure as well as endanger lives and
property.

A

Terrorists

36
Q

timely attack detection and reporting is key to initiating
the restoration and response processes

A

Attack Detection

37
Q

-relies on established procedures and mechanisms
for prioritizing restoration of essential functions.
-may
rely on backup or redundant links, information system components, or
alternative means of information transfe

A

Capability restoration

38
Q

: the items being protected by the system (documents, files, directories,
databases, transactions, etc.)

A

objects

39
Q

: entities (users, processes, etc.) that execute activities and request
access to objects.

A

subjects

40
Q

operations, primitive or complex, that can operate on objects and must be
controlled

A

actions

41
Q

authorized users are able to access it

A

availability

42
Q

the information is free of error and has the value expected;

A

accuracy

43
Q

the information is genuine

A

authenticity

44
Q

the information has not been disclosed to unauthorized
parties

A

confidentiality

45
Q

the information is whole, complete and uncorrupted;

A

integrity

46
Q

the information has value for the intended purpose;

A

utility

47
Q
A