Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

FCO

A(n) _____ is an authorization issued by an organization for the repair, modification, or update of a piece of equipment.

Weighted Factor Analysis

In an_______, each information asset is assigned a score for each of a set of assigned critical factor

data classification scheme

Many corporations use a _____ to help secure the confidentiality and integrity of information.

program

The ____ security policy is a planning document that outlines the processof implementing securitt in the organization

defend control

The _____ strategy attempts to prevent the exploitation of the vulnerability.

transfer control

The _____ strategy attempts to shift risk to other assets, other processes, or other organizations.

Accept control

The _____ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.

IR

The actions and organization can and perhaps should take while and incident is in the progress should be specified in a document called the __ plan

Risk Identification

The first phase of rish management is______

CBA

The formal decision making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) _____.

dumpster diving

There are individuals who search trash and recycling - a practice known as _____ - to retrieve information that could embarrass a company or compromise information security.

standard of due care

When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as a(n) _____.

DR

_____ plan usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dustsettles, or the floodwaters recede.

system specific

_____ policies address the particular use of certain systems.

MAC

addresses are sometimes called electronic serial numbers or hardware addresses

risk

equals likelihood of vulnerability occurrence times value minus already controlled plus an element of uncertanity

operational

feasibility analysis examines user acceptance and support, managment acceptance and support, and the overall requirements of the organization's stakeholders

confidential

in the U.S. military classification scheme,_____ data is any information or material the unathorized disclosure of which reasonbly could be expected to cause damage to the national security

ARO

is simply how often you expect a specific type of attack to occur

Risk Control

is the application of control to reduce the risk to an organizations data and information

general

the ___ security policy is an executive level document that outlines the organizations approach and sttitude towards information security and relates the strategic value of information security within the organization

disadvantage

the concept of competitive _____ refers to falling behind the competition

five

the military uses a_____ level classification scheme


Ensembles d'études connexes

Arts and Humanities Quick Recall Questions Part II

View Set

Unit 11 - Deceptive Trade Practices and Consumer Protection Act

View Set

Acid-Base Balance Practice Questions Week 5

View Set

Homework 1: Scientific Method, Research Articles, & Data Analysis

View Set

Accounting Midterm 1 (Ch. 1 - 5)

View Set

Marketing 340 Practice Quiz Questions

View Set

Chapter 8 - Prioritization, Delegation, and Assignment

View Set