1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
This is said to be much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use particulars as a resource in the organization.
Information System
It is a phase where a feasibility analysis is performed to assess the economic, technical, and behavioral feasibility of the process.
Investigation Phase
It is a phase that consists primarily of assessments of the organization, the status of current systems, and the capability to support the proposed systems.
Analysis Phase
It is a phase where specific technologies are selected to support alternatives identified and evaluated in the logical design.
Physical Design Phase
This phase refers to tasks necessary to support and modify the system for the remainder of its useful life, and the life cycle continues until the process begins again from the first phase.
Maintenance and Change Phase
The __________ is a basic process that involves the identification of threats and controls to counter them and refers to a coherent program rather than a series of random, seemingly unconnected actions.
SecSDLC
A position that is responsible for the assessment, management, and implementation of securing information in the organization.
Chief Information Security Officer
A position that refers to a senior technology officer who is primarily responsible for advising the senior executives for strategic planning.
Chief Information Officer
__________ is responsible for the security and use of a particular set of information.
Data Owner
__________ is responsible for the storage, maintenance, and protection of the information.
Data Custodian
______________ who work with the information to perform their daily jobs, supporting the mission of the organization.
Data Users
Security that refers to neither hard and fast rules nor many universally accepted complete solutions, and there is no magic user's manual for the security of the entire system.
Security as Art
Security that deals with technology designed to perform at high levels of performance and refers to particular conditions cause virtually all actions which occur in computer systems.
Security as Science
Security that examines the behavior of individuals interacting with systems and where end users may be the weakest link in the security chain.
Security as a Social Science
________________ can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles.
Security Admninistrators