IAS - Information Assurance and Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:37 PM on 9/11/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

Computer Security

The need to secure physical locations, hardware, and software from threats, which arose during World War II.

2
New cards

Security

The quality or state of being secure; protection against adversaries.

3
New cards

Information Security

Protection of information assets that use, store, or transmit information from risk through policy, education, and technology.

4
New cards

Physical Security

Protection of physical items, objects, or areas from unauthorized access and misuse.

5
New cards

Personnel Security

Protection of individuals authorized to access the organization and its operations.

6
New cards

Operations Security

Protection of the details of a particular operation or series of activities.

7
New cards

Communications Security

Protection of communications media, technology, and content.

8
New cards

Network Security

Protection of networking components, connections, and contents.

9
New cards

Access

A subject or object’s ability to use, manipulate, modify, or affect another subject or object.

10
New cards

Asset

The organizational resource that is being protected.

11
New cards

Attack

An intentional or unintentional act that can cause damage to information or systems.

12
New cards

Countermeasure

Security mechanisms, policies, or procedures that counter attacks and reduce risk.

13
New cards

Exploit

A technique used to compromise a system.

14
New cards

Exposure

A condition or state of being exposed.

15
New cards

Loss

An instance of an information asset suffering damage or unauthorized modification.

16
New cards

Protection Profile

The set of controls and safeguards implemented to protect an asset.

17
New cards

Risk

The probability that something unwanted will happen.

18
New cards

Subjects and Objects

Entities involved in an attack; subjects conduct the attack, objects are the targets.

19
New cards

Threat

A category of entities that presents a danger to an asset.

20
New cards

Threat Agent

A specific instance or component of a threat.

21
New cards

Vulnerability

A weakness in a system that opens it to attack or damage.

22
New cards

Availability

Enables authorized users to access information without interference.

23
New cards

Accuracy

Information is free from mistakes and meets user expectations.

24
New cards

Authenticity

The quality of being genuine or original.

25
New cards

Confidentiality

Protection from unauthorized disclosure.

26
New cards

Integrity

Information is whole, complete, and uncorrupted.

27
New cards

Utility

The quality of having value for a purpose.

28
New cards

Possession

The quality of ownership or control.

29
New cards

CNSS Security Model

Defines information security as the protection of information and its critical elements.

30
New cards

C.I.A

The three characteristics of information that give it value:confidentiality, integrity, and availability.

31
New cards

Information System

The entire set of software, hardware, data, people, procedures, and networks for using information resources.

32
New cards

Software

Applications, operating systems, and command utilities; the most difficult IS component to secure.

33
New cards

Hardware

The physical technology that houses and executes software and stores data.

34
New cards

Data

The most valuable asset, often targeted by intentional attacks.

35
New cards

People

The weakest link in an organizations information security program.

36
New cards

Procedures

Written instructions for accomplishing specific tasks.

37
New cards

Networks

The IS component that increased the need for information security.

38
New cards

Bottom-Up Approach

A method of implementing information security starting from lower levels of the organization.

39
New cards

Top-Down Approach

A method of implementing information security starting from senior management.

40
New cards

Systems Development Life Cycle (SDLC)

A methodology for designing and implementing an information system.

41
New cards

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance and Change.

Phases

42
New cards

Senior Management

Typically the CIO, responsible for strategic information plans.

43
New cards

Chief Information Security Officer (CISO)

Responsible for assessment, management, and implementation of information security.

44
New cards

Champion

A senior executive who promotes and supports information security projects.

45
New cards

Team Leader

A project manager who understands project and personnel management.

46
New cards

Security Policy Developers

Individuals who understand organizational culture and policy requirements.

47
New cards

Risk Assessment Specialists

Experts in financial risk assessment and security methods.

48
New cards

Security Professionals

Trained specialists in all aspects of information security.

49
New cards

Systems Administrators

Individuals responsible for administering systems that house information.

50
New cards

End Users

Those who will be most directly affected by the new system.

51
New cards

Data Owners

Individuals responsible for the security and use of specific information sets.

52
New cards

Data Custodians

Responsible for the storage, maintenance, and protection of information.

53
New cards

Data Users

End users who work with information to support the organization's mission.

Explore top notes

note
Cascading in CSS
Updated 1282d ago
0.0(0)
note
Chapter 37: International Trade
Updated 1283d ago
0.0(0)
note
Experimental Designs
Updated 1172d ago
0.0(0)
note
Gaffney S1 Finals
Updated 1178d ago
0.0(0)
note
Sociology
Updated 1160d ago
0.0(0)
note
BCOR 199-Exam1
Updated 1303d ago
0.0(0)
note
Cascading in CSS
Updated 1282d ago
0.0(0)
note
Chapter 37: International Trade
Updated 1283d ago
0.0(0)
note
Experimental Designs
Updated 1172d ago
0.0(0)
note
Gaffney S1 Finals
Updated 1178d ago
0.0(0)
note
Sociology
Updated 1160d ago
0.0(0)
note
BCOR 199-Exam1
Updated 1303d ago
0.0(0)

Explore top flashcards

flashcards
bio flashcards - genes/genetics
28
Updated 1073d ago
0.0(0)
flashcards
370 OSTEOPOROSIS
46
Updated 1123d ago
0.0(0)
flashcards
Paeth APUSH Period 4: 1800-1848
68
Updated 506d ago
0.0(0)
flashcards
Microbio Exam 1 Definitions
115
Updated 584d ago
0.0(0)
flashcards
Endo E2- Thyroid
85
Updated 372d ago
0.0(0)
flashcards
Edgar Allan Poe Vocabulary
40
Updated 1240d ago
0.0(0)
flashcards
bio flashcards - genes/genetics
28
Updated 1073d ago
0.0(0)
flashcards
370 OSTEOPOROSIS
46
Updated 1123d ago
0.0(0)
flashcards
Paeth APUSH Period 4: 1800-1848
68
Updated 506d ago
0.0(0)
flashcards
Microbio Exam 1 Definitions
115
Updated 584d ago
0.0(0)
flashcards
Endo E2- Thyroid
85
Updated 372d ago
0.0(0)
flashcards
Edgar Allan Poe Vocabulary
40
Updated 1240d ago
0.0(0)