Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CSCI340 Johnson Ch1

Authentication The process of determining the identity of an individual or device.
Availability Ensuring accessibility of information to authorized users when required.
Business process reengineering (BPR) A management technique used to improve the efficiency and effectiveness of a process within an organization.
Conidentiality Limiting access to information/data to authorized users only.
Continuous improvement An ad hoc, ongoing effort to improve business products, services, or processes.
Data at rest The state of data stored on any type of media.
Data in transit The state of data when traveling over or through a network.
Governance The act of managing implementation and compliance with organizational policies.
Guideline The parameters within which a policy, standard, or procedure recommended when possible but are optional.
Information assurance The implementation of controls designed to ensure confidentiality, integrity, availability, and non-repudiation.
Information systems security (ISS) The act of protecting information systems or IT infrastructures from unauthorized use, access, disruption, or destruction.
Information systems security management life cycle The five-phase management process of controlling the planning, implementation, evaluation, and maintenance of information systems security.
Integrity The act of ensuring that information has not been improperly changed.
Need to know A principle that restricts information access to only those users with an approved and valid requirement.
Nonrepudiation The concept of applying technology in way that an individual cannot deny or dispute they were part of a transaction.
Policy A document that states how the organization is to perform and conduct business functions and transactions with a desired outcome.
Policy framework A structure for organizing policies, standards, procedures, and guidelines.
Procedure A written statement describing the steps required to implement a process.
Security policies A set of policies that establish how an organization secures its facilities and IT infrastructure. Can also address how the organization meets regulatory requirements.
Service level agreement (SLA) The portion of a service contract that formally defines the level of service. These agreements are typical in telecommunications contracts for voice and data transmission circuits.
Standard An established and proven norm or method. This can be a procedural standard or a technical standard implemented organization-wide.
Created by: 1607686264