Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CSCI340 Johnson Ch1

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Authentication   The process of determining the identity of an individual or device.  
🗑
Availability   Ensuring accessibility of information to authorized users when required.  
🗑
Business process reengineering (BPR)   A management technique used to improve the efficiency and effectiveness of a process within an organization.  
🗑
Conidentiality   Limiting access to information/data to authorized users only.  
🗑
Continuous improvement   An ad hoc, ongoing effort to improve business products, services, or processes.  
🗑
Data at rest   The state of data stored on any type of media.  
🗑
Data in transit   The state of data when traveling over or through a network.  
🗑
Governance   The act of managing implementation and compliance with organizational policies.  
🗑
Guideline   The parameters within which a policy, standard, or procedure recommended when possible but are optional.  
🗑
Information assurance   The implementation of controls designed to ensure confidentiality, integrity, availability, and non-repudiation.  
🗑
Information systems security (ISS)   The act of protecting information systems or IT infrastructures from unauthorized use, access, disruption, or destruction.  
🗑
Information systems security management life cycle   The five-phase management process of controlling the planning, implementation, evaluation, and maintenance of information systems security.  
🗑
Integrity   The act of ensuring that information has not been improperly changed.  
🗑
Need to know   A principle that restricts information access to only those users with an approved and valid requirement.  
🗑
Nonrepudiation   The concept of applying technology in way that an individual cannot deny or dispute they were part of a transaction.  
🗑
Policy   A document that states how the organization is to perform and conduct business functions and transactions with a desired outcome.  
🗑
Policy framework   A structure for organizing policies, standards, procedures, and guidelines.  
🗑
Procedure   A written statement describing the steps required to implement a process.  
🗑
Security policies   A set of policies that establish how an organization secures its facilities and IT infrastructure. Can also address how the organization meets regulatory requirements.  
🗑
Service level agreement (SLA)   The portion of a service contract that formally defines the level of service. These agreements are typical in telecommunications contracts for voice and data transmission circuits.  
🗑
Standard   An established and proven norm or method. This can be a procedural standard or a technical standard implemented organization-wide.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1607686264
Popular Computers sets