1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
true
true or false: yberspace is "the environment in which communication over computer networks occurs.“
true
true or false: availability: Availability of information refers to ensuring that authorized parties are able to access the information when needed
true
true or false: availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
true
true or false: in information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle.
true
true or false: cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
Six Concept of CyberCrime
Confidentiality
Is roughly equivalent to privacy
confidentiality
assurance that information is shared only among authorized persons or organizations
true
true or false: cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets
true
true or false: Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target
information infrastructure
Information and data manipulation abilities in cyberspace;
true
truer or false: Information Assurance (IA) is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation
physical
Data and data processing activities in physical space;
Physical Security, Personnel Security, IT Security and Operational Security
four Security Domain
knowledge
accepted facts, principles, or rules of thumb that are useful for specific domains
true
true or false: actions taken that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation
data
Raw facts with a known coding system
noise
raw facts with an unknown coding system
integrity
Protection against unauthorized modification or destruction of information
information
it a a pocessed data
authentication
security measures to establish the validity of a transmission, message, or originator.
availability
Timely, reliable access to data and information services for authorized users;
information
Is data endowed with relevance and purpos
assurance that information is not disclosed to unauthorized persons
confidentiality
knowledge
accepted facts, principles, or rules of thumb that are useful for specific domains.
availability
Timely, reliable access to data and information services for authorized users;
physical
Data and data processing activities in physical space;
Physical Security, Personnel Security, IT Security and Operational Security
Four Security Domain
integrity
protection against unauthorized modification or destruction of information
true
true or false: information Assurance (IA) is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation.
raw facts with an unknown coding system
noise
information Infrastructure
Information and data manipulation abilities in cyberspace;
non-repudiation
assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data
security measures to establish the validity of a transmission, message, or originator.
authentication
true
true or false: actions taken that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and non-repudiation
information
it is a processed data
is data endowed with relevance and purpose
information
data
raw facts with a known coding system
confidentiality
assurance that information is not disclosed to unauthorized persons