Information Security ch.1
A computer is the _____ of an attack when it is used to conduct an attack against another computer.
subject
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.
False
The bottom-up approach to information security has a higher probability of success than the top-down approach.
False
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____.
Physical security
A breach of possession may not always result in a breach of confidentiality.
True
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
True
A server would experience a(n) _____ attack when a hacker compromises it to acquire information via a remote location using a network connection.
direct
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as _____.
information security
The community of interest made up of IT managers and skilled professionals in systems design, programming, networks, and other related disciplines is called _____.
information technology management and professionals
Individuals who control and are responsible for the security and use of a particular set of information are known as data _____.
owners