Prelim Lesson 1 Flashcards
is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen
Information Assurance
is the study of how to
protect
your
information
assets
from
destruction,
degradation, manipulation and exploitation. But also, how
to recover should any of those happen
Information Assurance
timely, reliable access to data and information services for authorized users
Availability
timely, reliable access to data and information services for authorized users
Availability
protection against unauthorized modification or destruction of information
Integrity
assurance that information is not disclosed to unauthorized persons
Confidentiality
security measures to establish the validity of a transmission, message,
or originator
Authentication
assurance that the sender is provided with proof of a data delivery
and recipient is provided with proof of the sender’s identity, so that neither can later deny
having processed the data
Non-repudiation
True or False: IT security cannot be accomplished in a
vacuum, because there are a multitude of dependencies and interactions
among all four security engineering domains.
True
protection of hardware, software, and data
against physical threats to reduce or prevent disruptions to operations and
services and loss of assets
Physical Security
a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.
Personnel Security
a variety of ongoing measures taken to reduce the
likelihood and severity of accidental and intentional alteration, destruction,
misappropriation, misuse, misconfiguration, unauthorized distribution, and
unavailability of an organization’s logical and physical assets, as the result
of action or inaction by insiders and known outsiders, such as business
partners.
Personnel Security
inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliabilit
IT Security
inherent technical features and functions that collectively
contribute to an IT infrastructure achieving and sustaining confidentiality,
integrity, availability, accountability, authenticity, and reliability
IT Security
involves the implementation of standard operational
security procedures that define the nature and frequency of the interaction
between users, systems, and system resources,
Operational Security
According to this, a
computing environment is made up of five continuously interacting
components
Raggad’s taxonomy of information technology
Includes information security and computer
IA
According to them, IA can be thought of as protecting
information at three distinct levels
Blyth and Kovacich