Principles 1 Flashcards

1
Q

-a well-informed sense of assurance that the information risks and controls are in balance.
-protection of both data and physical assets.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-must review the origins of this field to understanding of information security today.

A

security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-the quality or state of being secure- to be free from danger.
-a successful organization should have multiple layrs of security in place

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-the protection of physical items objects or areas from unauthorized access and misuse.

A

physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-a risk management process that encourage managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands

A

operations security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the protection of voice and data networking components connections and content.

A

communication security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-was standard based on confidentiality, integrity, and availability.
-now expanded into list of critical characteristics of information.

A

C.I.A triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(key information security concepts)
-a subject or object’s ability to use manipulate, modify or affect another subject or object

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(key information security concepts)
-the organizational resource that is being protected

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(key information security concepts)
-an intentional and unintentional act that can damage or otherwise compromise information in the systems that support it.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(key information security concepts)
-these are security mechanisms policies or procedures that can successfully counter attack reduce risk resolve vulnerabilities and otherwise imrpove securiity within an organization

A

control, safeguard or countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(key information security concepts)
-a technique used to compromise the system

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(key information security concepts)
-a condition or state of being exposed,

A

exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(key information security concepts)
-a single instance of information asset suffering damage or destruction unintended or unauthorized modification or disclosure or denial of use.

A

loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(key information security concepts)
the entire set of controls and safeguards including policy education training and awareness and technology that the organization implements to protect the asset.

A

protection profile or security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(key information security concepts)
-the probability of an unwanted occurence such as an adverse event or loss

A

risk

17
Q

(key information security concepts)
-a category of objects people or other entities that represent a danger to an asset

A

threat

18
Q

(key information security concepts)
-the specific instance or a component of a threat

A

threat agent

19
Q

(key information security concepts)
-a weakness of fault in a sstem or protection mechanisms that opens it to attack or damage.

A

vulnerability

20
Q

(critical characterisitics of information)
-an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

A

availability

21
Q

(critical characteristics of information)
-an attribute of information that describes how data is free of errors and has the value that the user expects.

A

accuracy

22
Q

(critical characteristics of information)
-an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.

A

authenticity

23
Q

(critical characteristics of information)
-an attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuas or systems

A

confidentiality

24
Q

(critical characteristics of information)
-an attribute of information that describes how data is whole complete and uncorrupted

A

integrity

25
Q

(critical characteristics of information)
-an attribute of information the describes how data has value or usefulness for an end purpose

A

utility

26
Q

(critical characteristics of information)
-an attribute of information that describes how the data’s ownership or control is legitimate or authorized

A

possession

27
Q

-a graphical representation of the architectural approach widely used in computer and information security

A

mccumber cube

28
Q

-is entire set of components necessary to use information as a resource in the organization

A

information security

29
Q

(components of an information system)
-includes applications including operating systems and assorted command

A

software

30
Q

(components of an information system)
-is a physical technology that houses and executres the softare stores and transports the data and provides interfaces for the entry and removal of information from the system

A

hardware

31
Q

(components of an information system)
-that are stored processed and transmitted by a computer system must be protected.

A

data

32
Q

(components of an information system)
-can be weakest link in an organization’s information security program unless policy education and training awareness and technology are properly employed to prevent people from a accidentally or intentionally damaging or losing information

A

people

33
Q

(components of an information system)
-are written in instructions for accomplishing a specific task

A

procedures

34
Q

(components of an information system)
-is a component created much of the need for increased computer information security even with the best planning and implementation it is impossible to obtain perfect information security.

A

networks