Week 1 Flashcards

1
Q

This person reports directly to the chief information
officer (CIO)

A

Chief information security officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ reports to the CISO and supervises technicians, administrators, and security staff.

A

Security manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ____ has both technical knowledge and managerial skills

A

Security administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This position is generally an entry-level position for a person who has the necessary technical skills

A

Security technician

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it is the goal to be free from danger as well as the process that achieves that freedom

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is intended to protect information that provides value to people and organizations

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are three protections that must be extended over information: ___, ___, –or CIA. -

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is important that only approved individuals are able to access important information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ ensures that the information is correct and no unauthorized person or malicious software has altered the data

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ ensures that data is accessible to authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In addition to the CIA, another set of protections must be implemented to secure information. These are ____, ____, ____ —or AAA

A

authentication, authorization, and accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_ is defined as an item that has value

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of action that has the potential to cause harm

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____is a person or element that has the power to carry out a threat

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ is a flaw or weakness that allows a threat agent to bypass security

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a situation that involves exposure to some type of danger

A

risk

17
Q

Identifying the risk but making the decision to not engage in the activity

A

Risk Avoidance

18
Q

____ simply means that the risk is acknowledged but no steps are taken to address it

A

Risk Acceptance

19
Q

____ is the attempt to address the risks by making risk less serious

A

Risk mitigation

20
Q

____ involves understanding something about the attacker and then informing him of the harm

A

Risk deterrence

21
Q

____ is the process of shifting the responsibility for managing a risk to another party.

A

Risk transference

22
Q

information security can be helpful in

A
  • preventing data theft,
  • thwarting identity theft,
  • avoiding the legal consequences of not securing information,
  • maintaining productivity, and foiling cyber terrorism.
23
Q

Steps of an Attack

A
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objectives