Cyber Security Chapter 1
__________ is a network project that preceded the Internet.
ARPANET
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.
Asset
__________ of information is the quality or state of being genuine or original.
Authenticity
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization
CISO
The protection of all communications media, technology, and content is known as ___________.
Communications Security
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.
DevOps
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.
Direct
A technique used to compromise a system is known as a(n) ___________.
Expliot
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.
Hash
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.
Information Security
__________ was the first operating system to integrate security as one of its core functions.
MULTICS
__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.
NSTISSI No. 4011
__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Physical
During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.
Physical Design
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.
Physical Security
Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.
Security
A computer is the __________ of an attack when it is used to conduct an attack against another computer.
Subject
A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.
System Development Life Cycle
People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.
System administrators
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.
Vulnerabilities
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
access
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization. a. software b. hardware c. data d. All of the above
d. All of the above
Which of the following is a valid type of role when it comes to data ownership? a. Data owners b. Data custodians c. Data users d. All of the above
d. All of the above
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.
logical
The longest and most expensive phase of the systems development life cycle is?
maintenance and change
A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
waterfall