Writing Assignment: Module 01 Flashcards

1
Q

What is information security?

A

information security is a term refering to many interlinked programs and activities that work together to create confidentiality, integrity, and availability for the information used by organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the CNSS model of information security organized?

A

Committee on National Security Systems (CNSS)
Confidentiality, Integrity, Availability on the (Y axis),
Policy, Education, Technolgy (Z axis),
Storage, Processing and Transmission on the (X axis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What three principles are used to define the C.I.A. triad? Define each in the context in which it is used in information security.

A

Confidentiality, integrity and availability

Confidentiality is roughly equivalent to privacy.

Integrity involves maintaining the consistency, accuracy and trustworthiness of data.

Availability means the information should be consistently ready and accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat in the context of information security?

A

Any event or circumstance that has the potential to adversely affect operations and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an asset in the context of information security?

A

organizational resource that is being protected be that be a Web site, software information, or data. Assets can also be physical, such as a person, a computer system, hardware, or other tangible objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an attack in the context of information security?

A

an attempt to gain unauthorized access to a computer, system or network with the intent to cause damage be that disabling, disrupting, destroing or controling a computer system, by the means of altering, blocking, deleting, manipulating or stealing the data held within these systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a vulnerability in the context of information security?

A

A potential weakness in an asset or its defensive control system(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a loss in the context of information security?

A

a single instance of a information asset that suffers damage or destruction, unintended or unauthorized modification or disclosure, or denial of use. As one example, when an organization’s informatio is stolen, it has suffered a loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is intellectual property? Describe at least one threat to this type of asset.

A

intellectual property can be trade secrets, proprietary processes, copyrights, trademarks, and patents. An attack on that could be stealing identifiable information of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an availability disruption? Pick a utility service provider and describe what might constitute a disruption.

A

A reduced level of service in an element of the critical infrastructure. CenturyLink a power outage could be considers a disruption to serveices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a hacker and what are terms used to describe their skill levels?

A

a hackeris someone who spends long hours examining the types and structures of targeted system, the level of a hacker comes down to if they are an expert hacker or a novice hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a brute force password attack differ from a dictionary password attack?

A

a Brute Force password attack trys every possible password combination, a Dictionary attack trys common passwords and includes information related to the target user, such as names of relatives or pets, and familiar numbers such as phone numbers, addresses, and even Social Security numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing, and how is spear phishing different?

A

Phishing attacks use two primary techniques, often in combination with one another: URL manipulation and Web site forgery. Phishing attacks aim to decive and fool as meny people as posible. spear phishing involves an attacker sending a targeted message that appears to be from an employer, a colleague, or some other legitimate correspondent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In general terms, what is policy?

A

a statement or set of principles of action to follow to help guide and regulate employee behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an enterprise information security policy, and how is it used?

A

a high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is shaping policy considered difficult?

A

Shaping policy is difficult because it must not conflict with laws, must stand up in court if challenged, and must be properly administered.

17
Q

What are standards? How are they different from policy?

A

Policies act as a statement, standards function as rules to achieve that statement

18
Q

What is an issue-specific security policy?

A

An ISSP is a organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource.

19
Q

List the critical areas covered in an issue-specific security policy.

A

Statement of policy, Authorized access and usage of technology, Prohibited usage of technology, Systems management, Violations of policy, Policy review and modification, Limitations of liability.

20
Q

What is a systems-specific security policy?

A

SysSPs are Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems

21
Q

When is a systems-specific security policy used?

A

its used in configuring and maintaining systems

22
Q

What is risk management?

A

is forecasting and evaluation of potential risks

23
Q

What are the two main parts of risk management?

A

risk management framework and the risk management process.

24
Q

Who is expected to be engaged in risk management activities in most organizations?

A

The Risk Manager

25
Q

What are the basic strategies used to control risk? Define each.

A

Defense—Applying controls and safeguards that eliminate or reduce the remaining uncontrolled risk

Transference—Shifting risks to other areas or to outside entities

Mitigation—Reducing the impact to information assets should an attacker successfully exploit a vulnerability

Acceptance—Understanding the consequences of choosing to leave an information asset’s vulnerability facing the current level of risk, but only after a formal evaluation and intentional acknowledgment of this decision

Termination—Removing or discontinuing the information asset from the organization’s operating environment