Info sec part 1
is the process that logs and proves that a certain action has taken place without any doubt
Accountability
With the level of complexity in today's information systems, the implementation of information security has often been described as a combination of ___.
Art and Science
___ is the process through which one proves and verifies certain information.
Authentication
If information has a state of being genuine or original and is not a fabrication, it has the characteristic of __.
Authenticity
__ is the process of proving that one holds the identity that the person claims to hold.
Authorization
__ is an access nomenclature that the system is usable and contrast the Denial of service.
Availability
Information security programs that begin at a grassroots level by system administrators to improve security are often called a __.
Bottom up approach
A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization, is called a(n) ___.
Champion
__ security encompasses the protection of an organization's communications media, technology, and content.
Communications
___.is the protection of private data from un authorized viewing
Confidentiality
The person responsible for the storage, maintenance,and protection of the information is the__.
Data Custodian
___ responsible for the storage, maintanance, and protection of the information.
Data Custodian
__ Usually determine the level of data classification associated with the data, as well as changes to that classification required by organizational change
Data owners
___ are end users who work with the information to perform their daily jobs supporting the mission of the organization
Data users
__ is the process through which one ascertains the identity of another person or entity.
Identification
An___ is much more than computer hardware; it is the entire set of software,hardware,data,people.procedures, and networks necessary to use information as a resource in the organization
Information System
___. is data that is not corrupted or modified in any unauthorized manner.
Integrity
Which SecSDLC phase keeps the security systems in a high state of readiness
Maintenance and change
__ security addresses the protection of individuals or groups authorized to access an organization
Personal Security
__ security addresses the issues needed to protect items, objects, or areas of an organization from unauthorized access and misuse
Physical security
Ownership or control of information is called the characteristic of__.
Possession
____. "The quality or state of being secure-to be free from danger."
Security
The best approach for implementing an information security system in an organization with little or no formal security in place is to use a variation of the systems development life cycle
Security SDLC
___ Examines the behavior of individuals as they interact with systems, whether societal systems or information systems.
Social science
A formal approach to solving a problem based on a structure sequence of procedures is called a(n)__.
Systems development life cycle methodology
When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n)__ approach.
Top down approach
Identify one of the three most commonly encountered communities of interest that have roles and responsibilities in information security___.
information security management and professionals, information technology management and professionals, organizational management and professionals