information assurance and security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

39 Terms

1
New cards

true

true or false: yberspace is "the environment in which communication over computer networks occurs.“

2
New cards

true

true or false: availability: Availability of information refers to ensuring that authorized parties are able to access the information when needed

3
New cards

true

true or false: availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.

4
New cards

true

true or false: in information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle.

5
New cards

true

true or false: cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

6
New cards

Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

Six Concept of CyberCrime

7
New cards

Confidentiality

Is roughly equivalent to privacy

8
New cards

confidentiality

assurance that information is shared only among authorized persons or organizations

9
New cards

true

true or false: cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

10
New cards

true

true or false: Concept of Cybercrime

Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target

11
New cards

information infrastructure

Information and data manipulation abilities in cyberspace;

12
New cards

true

truer or false: Information Assurance (IA) is the study of how to protect your  information assets from destruction, degradation, manipulation and  exploitation

13
New cards

physical

Data and data processing activities in physical space;

14
New cards


Physical Security, Personnel Security, IT Security and Operational Security

four Security Domain

15
New cards

knowledge

accepted facts, principles, or rules of thumb that are  useful  for specific domains

16
New cards

true

true or false: actions taken that protect and defend information and  information systems by ensuring their availability,  integrity, authentication, confidentiality and non-repudiation

17
New cards

data

Raw facts with a known coding system

18
New cards

noise

raw facts with an unknown coding system

19
New cards

integrity

Protection against unauthorized modification or  destruction of information

20
New cards

information

it a a pocessed data

21
New cards

authentication

security measures to establish the validity of a  transmission, message, or originator.

22
New cards

availability

Timely, reliable access to data and information  services for authorized users;

23
New cards

information

Is data  endowed with relevance  and purpos

24
New cards

assurance that information is not disclosed to  unauthorized persons

confidentiality

25
New cards

knowledge

accepted facts, principles, or rules of thumb that are  useful  for specific domains.

26
New cards

availability

Timely, reliable access to data and information  services for authorized users;

27
New cards

physical

Data and data processing activities in physical space;

28
New cards

Physical Security, Personnel Security, IT Security and Operational Security

Four Security Domain

29
New cards

integrity

protection against unauthorized modification or  destruction of information

30
New cards

true

true or false: information Assurance (IA) is the study of how to protect your  information assets from destruction, degradation, manipulation and  exploitation.   

31
New cards

raw facts with an unknown coding system

noise

32
New cards

information Infrastructure

Information and data manipulation abilities in cyberspace;

33
New cards

non-repudiation

assurance that the sender is provided with proof  of a data delivery and recipient is provided with proof  of the sender’s identity, so that neither can later deny  having processed the data

34
New cards

security measures to establish the validity of a  transmission, message, or originator.

authentication

35
New cards

true

true or false: actions taken that protect and defend information and  information systems by ensuring their availability,  integrity, authentication, confidentiality and non-repudiation

36
New cards

information

it is a processed data

37
New cards

is data  endowed with relevance  and purpose

information

38
New cards

data

raw facts with a known coding system

39
New cards

confidentiality

assurance that information is not disclosed to  unauthorized persons

Explore top flashcards