Section 1 Flashcards
The following describes what?
Act of protecting data and information from unauthorized access,
unlawful modification and disruption, disclosure, corruption, and
destruction
Information Security
The following describes what?
Act of protecting the systems that hold and process our critical data
Information Systems Security
What does the CIA triad stand for?
C - Confidentiality
I - Integrity
A - Availability
The following describes which part of the CIA triad?
Information has not been disclosed to unauthorized people
Confidentiality
The following describes which part of the CIA triad?
Information has not been modified or altered without proper
authorization
Integrity
The following describes which part of the CIA triad?
Information is able to be stored, accessed, or protected at all times
Availability
What does the AAA of security stand for?
Authentication, Authorization and Accounting
The following describes which triple A of security?
When a person’s identity is established with proof and confirmed by a
system:
● Something you know
● Something you are
● Something you have
● Something you do
● Somewhere you are
Authentication
The following describes which triple A of security?
Occurs when a user is given access to a certain piece of data or certain
areas of a building
Authorization
The following describes which triple A of security?
Tracking of data, computer usage, and network resources
Accounting
This occurs when you have proof that someone has taken an action.
Non-repudiation
What are the four security threats?
Malware
Unauthorized Access
System Failure
Software Engineering
This is a short-hand term for malicious software
Malware
This occurs when access to computer resources and data occurs without the
consent of the owner
Unauthorized Access
This occurs when a computer crashes or an individual application fails
System Failure
This is the act of manipulating users into revealing confidential information or
performing other detrimental actions
Social Engineering
When it comes to mitigation what are some examples of physical controls?
Alarm systems, locks, surveillance cameras, identification cards, and
security guards
When it comes to mitigation what are some examples of technical controls?
Smart cards, encryption, access control lists (ACLs), intrusion detection
systems, and network authentication
When it comes to mitigation what are some examples of administrative controls?
Policies, procedures, security awareness training, contingency planning,
and disaster recovery plans
What is the most cost-effective security control to use?
User training
What are the five types of hackers?
White Hats
Black Hats
Gray Hats
Blue Hats
Elites
What kind of hacker is the following describing?
Non-malicious hackers who attempt to break into a company’s
systems at their request
White Hats
What kind of hacker is the following describing?
Malicious hackers who break into computer systems and networks
without authorization or permission
Black Hats
What kind of hacker is the following describing?
Hackers without any affiliation to a company who attempt to
break into a company’s network but risk the law by doing so
Gray Hats