Information Security ch.1

Ace your homework & exams now with Quizwiz!

A computer is the _____ of an attack when it is used to conduct an attack against another computer.

subject

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

False

The bottom-up approach to information security has a higher probability of success than the top-down approach.

False

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____.

Physical security

A breach of possession may not always result in a breach of confidentiality.

True

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

True

A server would experience a(n) _____ attack when a hacker compromises it to acquire information via a remote location using a network connection.

direct

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as _____.

information security

The community of interest made up of IT managers and skilled professionals in systems design, programming, networks, and other related disciplines is called _____.

information technology management and professionals

Individuals who control and are responsible for the security and use of a particular set of information are known as data _____.

owners


Related study sets

Chapter 8: Organizational Ethics and Law

View Set

Revel Chapter 4, Chapter 3 Revel, Chapter 2 Revel

View Set

Module 41. Anxiety Disorders, OCD, and PTSD

View Set

Ch. 11: Price: Determining Monetary and Nonmonetary Incentives and Disincentives

View Set