Computer Security - Module 1

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:38 PM on 2/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

This is said to be much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use particulars as a resource in the organization.

Information System

2
New cards

It is a phase where a feasibility analysis is performed to assess the economic, technical, and behavioral feasibility of the process.

Investigation Phase

3
New cards

It is a phase that consists primarily of assessments of the organization, the status of current systems, and the capability to support the proposed systems.

Analysis Phase

4
New cards

It is a phase where specific technologies are selected to support alternatives identified and evaluated in the logical design.

Physical Design Phase

5
New cards

This phase refers to tasks necessary to support and modify the system for the remainder of its useful life, and the life cycle continues until the process begins again from the first phase.

Maintenance and Change Phase

6
New cards

The __________ is a basic process that involves the identification of threats and controls to counter them and refers to a coherent program rather than a series of random, seemingly unconnected actions.

SecSDLC

7
New cards

A position that is responsible for the assessment, management, and implementation of securing information in the organization.

Chief Information Security Officer

8
New cards

A position that refers to a senior technology officer who is primarily responsible for advising the senior executives for strategic planning.

Chief Information Officer

9
New cards

__________ is responsible for the security and use of a particular set of information.

Data Owner

10
New cards

__________ is responsible for the storage, maintenance, and protection of the information.

Data Custodian

11
New cards

______________ who work with the information to perform their daily jobs, supporting the mission of the organization.

Data Users

12
New cards

Security that refers to neither hard and fast rules nor many universally accepted complete solutions, and there is no magic user's manual for the security of the entire system.

Security as Art

13
New cards

Security that deals with technology designed to perform at high levels of performance and refers to particular conditions cause virtually all actions which occur in computer systems.

Security as Science

14
New cards

Security that examines the behavior of individuals interacting with systems and where end users may be the weakest link in the security chain.

Security as a Social Science

15
New cards

________________ can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles.

Security Admninistrators

Explore top flashcards

Vocab 4-6
Updated 753d ago
flashcards Flashcards (30)
PSYC 100 Exam 1
Updated 487d ago
flashcards Flashcards (61)
Vocabulary
Updated 1047d ago
flashcards Flashcards (57)
Travel and leisure
Updated 276d ago
flashcards Flashcards (112)
Vocab 4-6
Updated 753d ago
flashcards Flashcards (30)
PSYC 100 Exam 1
Updated 487d ago
flashcards Flashcards (61)
Vocabulary
Updated 1047d ago
flashcards Flashcards (57)
Travel and leisure
Updated 276d ago
flashcards Flashcards (112)