Question 1 Flashcards

1
Q

Name the five protection components

A

Operation,Technology, people,Physical security and data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State the attributes of Architecture

A
(System design)
(Organizational Higericarchy)
(Real time management)
(Performance Metric)
(Roles and responsibilities)
(Performance management)
Enterprise architecture - scope, business models,system models,technical models,detail representation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State the attributes of resilience

A
(Tolerance)
(Robustness)
(Adaptability)
(Utility)
(Accessibility)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the attributes of dependability

A
(Availability)
(Reliability)
(Safety)
(Confidentiality)
(Integrity)
(Maintainability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State the attributes of security

A

(Confidentiality)
(Integrity)
(Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State the attributes of risk managment

A
(Risk Description)
(Risk Category)
(Risk Type)
(Risk Probability)
(Risk impact)
(Risk Magnitude)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State the attributes of people

A

System security and Administration

  • Physical security
  • Training and awareness
  • Policies and procedures
  • Facilities and counter measures
  • Personal security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State the attributes of technology

A
  • IA architecture
  • IA Criteria
  • Acquisition integration of evaluated products
  • System risk Assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the attributes Physical security

A
  • Facility requirements
  • Physical Access control
  • Data center security
  • Personnel Practices
  • Mobile security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State the attributes of Data security

A
  • Data classification
    • Access control methods
    • Roles and responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State the five trust Attributes

A

Attraction, Faith, intention, Dynamism and expertness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State the attributes of safety

A

System safety (good state, bad state)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State the attributes of operation

A
Security policy
Certification and a redaction 
Key management 
Readiness assessments
A5W&R
Recovery and position
Security management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly