click below
click below
Normal Size Small Size show me how
Exam 1 Review Exerci
Principles of information security
| Question | Answer |
|---|---|
| ...enables authorized users—persons or computer systems—to access information without interference or obstruction, and to receive it in the required format. | Availability |
| Information has ... when it is free from mistakes or errors and it has the value that the end user expects. | accuracy |
| ...of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. | Authenticity |
| Information has ...when disclosure or exposure to unauthorized individuals or systems is prevented. | confidentiality |
| Information has ...when it is whole, complete, and uncorrupted. | integrity |
| The ... of information is the quality or state of having value for some purpose or end. | utility |
| The ... of information is the quality or state of ownership or control of some object or item. | possession |
| six layers of security. | • Physical security • Personal security • Operations security • Communications security • Network security • Information security |
| six components of an Information System. | • Software • Hardware • Data • People • Procedures • Networking |
| What is the difference between the subject and object of an attack? | The subject of an attack is an agent entity used to conduct the attack. The object of an attack is the target entity. |
| What does ARPA stand for? | Advanced Research Project Agency |
| six steps of the SecSDLC | • Investigation • Analysis • Logical design • Physical design • Implementation • Maintenance and change |
| The organizational resource that is being protected. | Asset |
| A technique used to compromise a system | Exploit |
| The probability that something can happen. | Risk |
| An object, person, or other entity that represents a constant danger to an asset | Threat |
| allows the attacker to access the system at will with special privileges. | A back door or trap door |
| A technique used to compromise a system | Exploit |
| People who use and create computer software to gain access to information illegally. | Hackers |
| Synonymous with cyber activist. An individual who uses technology as a tool for civil disobedience. | Hacktivist |
| Software designed to damage, destroy, or deny service to the target system. | Malicious code or Malware |
| Hackers of limited skill who use expertly written software to exploit a system but do not fully understand or appreciate the systems they hack. | Script kiddies |
| The illegal taking of another’s property. | Theft |
| Software programs that hide their true nature (usually destructive), and reveal their designed behavior only when activated. | Trojan horse |
| Weakness in a controlled system, where controls are not present or are no longer effective. | Vulnerability |
| a malicious program that replicates itself constantly, without requiring another program environment. | worm |
| E-mail warning of a virus that is fictitious. | Virus hoax |
| List the four (4) types of laws. | Civil law Criminal law Private law Public law |
| Also known as the Kennedy-Kassebaum Act protects the confidentiality and security of health-care data by establishing and enforcing standards and by standardizing electronic data interchange. | HIPAA |
| It was one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices. | Computer Security Act |
| The ... contains a number of provisions focusing on facilitating affiliation among banks, securities firms, and insurance companies | The Financial Services Modernization Act or Gram-Leach-Bliley Act |
| ...allows any person to request access to federal agency records or information not determined to be a matter of national security. | The Freedom of Information Act |