focusNode
Didn't know it?
click below
Knew it?
click below
Embed Code - If you would like this activity on your web page, copy the script below and paste it into
your web page.
Normal Size Small Size show me how
Principles of information security
...of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. | Authenticity |
A...is a formal approach to solving a problem based on a structured sequence of procedures. | methodology |
The...component of the information system comprises applications, operating systems, and assorted command utilities. | software |
The McCumber cube consists of 27 cells representing areas that must be addressed to secure today's information systems. The final axis consists of storage,... and transmission | processing |
A frequently overlooked component of information systems, ... are written instructions for accomplishing a specific task. | Procedures |
The...of information is defined as having ownership or control of some object or item | possession |
In an organization, the value of ... of information is especially high when it involves personal information about employees, customers, or patients | confidentiality |
The...phase consists primarily of assessments of the organization the status of current system, and the capability to support the proposed systems. | analysis |
In the ... approach the project is initiated by upper_level managers who issue policy, procedures and processes, dictate the goals and expected outcomes of the project, and determine who is accountable for each of the required actions | Top_down |
The ... project is the origin of today's Internet | Arpanet |
The history of information security begins with the history of...security. | computer |
An...information security policy outlines the implementation of a security program within the organization. | enterprise |
The internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected Local Area... | Network |
Information has...when it is whole, complete, and uncorrupted. | Integrity |
The senior technology officer is typically the chief ... officer. | Executive |
A...is a group of individuals who are united by similar interests or values within an organization and who share a common goal of making the organization function to meet its objectives. | community of interest |
...ensures authorized users - persons or computer systems can access information without interference or obstruction, and in the required format. | Availability |
During the early years, inf security was a straight forward process composed predominantly of ... security and simple document classification schemes. | physical |
A computer is the...of an attack when it is used as an active tool to con dict the attack | subject |
the NSTISSC model of information security evolved from a concept developed by the computer security industry known as the...triangle | C.I.A |
Are you studying for the CISSP certification?
Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Skillset helps you pass your certification exam.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.
Get A Free Skillset Account
Front | Back |
Information has ______ when it is whole, complete, and uncorrupted. | Integrity |
In an organization, the value of _________ of information is especially high when it involves personal information about employees, customers, or patients. | Confidentiality |
A computer is the _______ of an attack when it is the target entity. | Object |
In the ___ _____ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action. | Top-down |
During the ____ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. | Cold |
The ______ component of the IS comprises applications, operating systems, and assorted command utilities. | Software |
The senior technology officer is typically the chief ______ officer. | Information |
A frequently overlooked component of an IS, _____ are written instructions for accomplishing a specific task. | Procedures |
The CNSS model of information security evolved from a concept developed by the computer security industry known as the _____ triangle. | CIA |
A(n) _______ information security policy outlines the implementation of a security program within the organization. | Enterprise |
A(n) ________ is a formal approach to solving a problem by means of a structured sequence of procedures. | Methodology |
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ______ . | Network |
The ______ of information is the quality or state of ownership or control of some object or item. | Possession |
________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. | Authenticity |
_________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format. | Availability |