midterm Security Chapter 1
Availability assures that systems works promptly and service is not denied to authorized users. True or False
True
Computer security is protection of the integrity, availability, and confidentiality of information system resources. True or False
True
Data integrity assures that information and programs are changed only in a specified and authorized manner. True or False
True
A loss of ______ is the unauthorized disclosure of information. A. confidentiality B. integrity C. authenticity D. availability
A. Confidentiality
__________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. A. System Integrity B. Data Integrity C. Availability D. Confidentiality
A. System Integrity
A(n) ______________is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
Attack
Confidentiality, Integrity, and Availability form what is often referred to as the ________________.
CIA triad
___________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
Computer Security
In the United States, student grade information is an asset whose confidentiality is regulated by the ________.
FERPA (Family Educational Rights and Privacy Act)
The "A" in the CIA triad stands for "authenticity". True or False
False
Threats are attacks carried out. True or False
False
A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) ._______________ A. countermeasure B. vulnerability C. adversary D. risk
B. Vulnerability
____________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. A. Availability B. System Integrity C. Privacy D. Data Integrity
C. Privacy
A. ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A. low B. normal C. moderate D. high
D. High
A loss of ___________ is the disruption of access to or use of information or an information system.
availability