Info sec part 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

is the process that logs and proves that a certain action has taken place without any doubt

Accountability

With the level of complexity in today's information systems, the implementation of information security has often been described as a combination of ___.

Art and Science

___ is the process through which one proves and verifies certain information.

Authentication

If information has a state of being genuine or original and is not a fabrication, it has the characteristic of __.

Authenticity

__ is the process of proving that one holds the identity that the person claims to hold.

Authorization

__ is an access nomenclature that the system is usable and contrast the Denial of service.

Availability

Information security programs that begin at a grassroots level by system administrators to improve security are often called a __.

Bottom up approach

A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization, is called a(n) ___.

Champion

__ security encompasses the protection of an organization's communications media, technology, and content.

Communications

___.is the protection of private data from un authorized viewing

Confidentiality

The person responsible for the storage, maintenance,and protection of the information is the__.

Data Custodian

___ responsible for the storage, maintanance, and protection of the information.

Data Custodian

__ Usually determine the level of data classification associated with the data, as well as changes to that classification required by organizational change

Data owners

___ are end users who work with the information to perform their daily jobs supporting the mission of the organization

Data users

__ is the process through which one ascertains the identity of another person or entity.

Identification

An___ is much more than computer hardware; it is the entire set of software,hardware,data,people.procedures, and networks necessary to use information as a resource in the organization

Information System

___. is data that is not corrupted or modified in any unauthorized manner.

Integrity

Which SecSDLC phase keeps the security systems in a high state of readiness

Maintenance and change

__ security addresses the protection of individuals or groups authorized to access an organization

Personal Security

__ security addresses the issues needed to protect items, objects, or areas of an organization from unauthorized access and misuse

Physical security

Ownership or control of information is called the characteristic of__.

Possession

____. "The quality or state of being secure-to be free from danger."

Security

The best approach for implementing an information security system in an organization with little or no formal security in place is to use a variation of the systems development life cycle

Security SDLC

___ Examines the behavior of individuals as they interact with systems, whether societal systems or information systems.

Social science

A formal approach to solving a problem based on a structure sequence of procedures is called a(n)__.

Systems development life cycle methodology

When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n)__ approach.

Top down approach

Identify one of the three most commonly encountered communities of interest that have roles and responsibilities in information security___.

information security management and professionals, information technology management and professionals, organizational management and professionals


Ensembles d'études connexes

Acct 311 Chapter 5 Cost-Volume-Profit Relationships

View Set

Chapter 34: PrepU - Nursing Management: Patients With Male Reproductive Disorders

View Set

Principles of Criminal Justice exam 1 review

View Set

Anatomy Chapter 9 - Muscular System

View Set

Life Insurance Exam - Chuck Johnson

View Set