Cyber Security Chapter 1

Ace your homework & exams now with Quizwiz!

__________ is a network project that preceded the Internet.

ARPANET

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.

Asset

__________ of information is the quality or state of being genuine or original.

Authenticity

The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization

CISO

The protection of all communications media, technology, and content is known as ___________.

Communications Security

An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.

DevOps

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

Direct

A technique used to compromise a system is known as a(n) ___________.

Expliot

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

Hash

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

Information Security

__________ was the first operating system to integrate security as one of its core functions.

MULTICS

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

NSTISSI No. 4011

__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

Physical

During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.

Physical Design

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.

Physical Security

Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.

Security

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Subject

A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.

System Development Life Cycle

People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.

System administrators

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

Vulnerabilities

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

access

An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization. a. software b. hardware c. data d. All of the above

d. All of the above

Which of the following is a valid type of role when it comes to data ownership? a. Data owners b. Data custodians c. Data users d. All of the above

d. All of the above

The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

logical

The longest and most expensive phase of the systems development life cycle is?

maintenance and change

A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.

waterfall


Related study sets

Lesson quiz 25-1 (thru 3) India (world geo)

View Set

A & P1: Chapters 1-16: Final Exam Study Guide

View Set

Henry "Divorceman" VIII Strikes Again! (How Millennials and also a dead British Dude are Killing the Marriage Industry)

View Set

Chapter 16: Nursing Care of the Family During Labor and Birth NCLEX

View Set

Chapter 10 Exam: Social Security

View Set

English Discoveries - Supermarket Shopping

View Set

Medical Surgical Nursing: Fluid, Electrolyte, and Acid-Base Imbalances

View Set

Precalculus: College Algebra & Trigonometry 6/e, by Donnelly

View Set

Eastern Europe and Russia Regional Information

View Set