IT 108 - Information Assurance and Security Midterm Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terms related to Information Assurance and Security from the midterm notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What is the difference between data and information?

Data refers to raw, unprocessed facts and figures, while information is processed data organized to provide meaning.

2
New cards

What does Information Assurance (IA) aim to achieve?

IA minimizes overall risks to a company's information by applying organizational-wide standards to reduce threats to information security.

3
New cards

What is the CIA Triad in Information Security?

The CIA Triad refers to the principles of Confidentiality, Integrity, and Availability.

4
New cards

What significant event did the Morris Worm (1988) represent?

It was the first recognized computer worm that caused significant impact on computer systems.

5
New cards

What key benefit does information assurance provide in terms of customer relations?

Increased customer trust through the protection of sensitive data and compliance with regulations.

6
New cards

What are some key security principles?

Key security principles include Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation.

7
New cards

What is the purpose of an Information Security Lifecycle?

The Information Security Lifecycle provides a framework for managing information security to protect assets and reduce risks.

8
New cards

What does compliance in Information Assurance refer to?

Ensuring that an organization meets regulatory requirements and does not suffer legal consequences.

9
New cards

Define 'insider threat' in cybersecurity.

An insider threat is the potential for a person within the organization to misuse their authorized access to harm the organization's assets.

10
New cards

What is the role of encryption in maintaining data security?

Encryption protects data by converting it into a format that can only be read with the correct decryption key.

11
New cards

What is social engineering in the context of cybersecurity?

Social engineering is the psychological manipulation of individuals to gain confidential information or perform actions that compromise security.

12
New cards

Why is multi-factor authentication (MFA) important in cybersecurity?

MFA adds an extra layer of security beyond usernames and passwords, which helps to prevent unauthorized access even when credentials are compromised.

13
New cards

What is the significance of Universal Access Control List (ACL) in cybersecurity?

ACLs define the permissions for users and groups to access resources in a network, preventing unauthorized access.

14
New cards

What are the implications of the General Data Protection Regulation (GDPR) on organizations?

GDPR imposes strict data protection and privacy regulations, requiring organizations to ensure compliance to avoid penalties.

15
New cards

What are Advanced Persistent Threats (APTs)?

APTs are prolonged cyberattacks in which an attacker gains access to a network and remains undetected for an extended period.

16
New cards

Explain the difference between authentication and authorization in cybersecurity.

Authentication verifies a user's identity, while authorization determines what resources a user can access.