CSCI340 Johnson Ch1
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Authentication | The process of determining the identity of an individual or device.
🗑
|
||||
Availability | Ensuring accessibility of information to authorized users when required.
🗑
|
||||
Business process reengineering (BPR) | A management technique used to improve the efficiency and effectiveness of a process within an organization.
🗑
|
||||
Conidentiality | Limiting access to information/data to authorized users only.
🗑
|
||||
Continuous improvement | An ad hoc, ongoing effort to improve business products, services,
or processes.
🗑
|
||||
Data at rest | The state of data stored on any type of media.
🗑
|
||||
Data in transit | The state of data when traveling over or through a network.
🗑
|
||||
Governance | The act of managing implementation and compliance with organizational policies.
🗑
|
||||
Guideline | The parameters within which a policy, standard, or procedure recommended when possible but are optional.
🗑
|
||||
Information assurance | The implementation of controls designed to ensure confidentiality, integrity, availability, and non-repudiation.
🗑
|
||||
Information systems security (ISS) | The act of protecting information systems or IT infrastructures from unauthorized use, access, disruption, or destruction.
🗑
|
||||
Information systems security management life cycle | The five-phase management process of controlling the planning, implementation, evaluation, and maintenance of information
systems security.
🗑
|
||||
Integrity | The act of ensuring that information has not been improperly changed.
🗑
|
||||
Need to know | A principle that restricts information access to only those users with an approved and valid requirement.
🗑
|
||||
Nonrepudiation | The concept of applying technology in way that an individual cannot deny or dispute they were part of a transaction.
🗑
|
||||
Policy | A document that states how the organization is to perform and conduct business functions and transactions with a desired outcome.
🗑
|
||||
Policy framework | A structure for organizing policies, standards, procedures, and guidelines.
🗑
|
||||
Procedure | A written statement describing the steps required to implement a process.
🗑
|
||||
Security policies | A set of policies that establish how an organization secures its facilities and IT infrastructure. Can also address how the organization meets regulatory requirements.
🗑
|
||||
Service level agreement (SLA) | The portion of a service contract that formally defines the level of
service. These agreements are typical in telecommunications contracts for voice and data transmission circuits.
🗑
|
||||
Standard | An established and proven norm or method. This can be a procedural standard or a technical standard implemented organization-wide.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
1607686264
Popular Computers sets