Week 1 Unit 1 Legal Issues in Information Security- Information Systems Security Overview Flashcards

1
Q

What is the “information security triad”?

A

Availability
Integrity
Confidentiality (AIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common information security concerns?

A
Shoulder surfing
Social Engineering
Spear phishing
Malware
Spyware
Logic bomb
Back door denial of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Classification: Military and Corporate

A

See Table 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legal mechanisms to ensure information security

A

Laws
Information Regulations
Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Laws to ensure Information Security

A

Gramm-Leach-Bliley Act
HIPAA
Sarbanes-Oxley (SOX)
and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Regulations to ensure Information Security

A

Financial
Credit Card
Health
etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agencies to ensure information security

A
FTC
Banks
DHHS
SEC
DOE
etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management Concepts

A
Vulnerability
Mitigation
Threat Agent
Exploits
Risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

Asset weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mitigation

A

Safeguard assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Agent

A

Hacker or malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exploits

A

Threats carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risks

A

minimized by asset owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Management Process

A

See Chart 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Roles in Risk Management

A

See Chart 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Security in Different Contexts

A

See Table 2

17
Q

Access Control Models

A

Discretionary
Mandatory
Role-Based

18
Q

Discretionary Access control (DAC)

A

Discretion of the owner

19
Q

Mandatory Access Control (MAC)

A

Security labels & classifications

20
Q

Role-Based Access Control (RBAC)

A

Job function of role

21
Q

Law and Information Security

A
Cyberspace theft
Internet extortion
Online pedophilia
Jurisdiction issues
Electronic signature issues
22
Q

Confidentiality

A

Only people with the right permission can access and use information

23
Q

Integrity

A

Information systems and their data are accurate, and that changes cannot be mad to data without correct permissions

24
Q

Availability

A

Makes sure that data is accessible to the users