IT6106A - Information Assurance and Security 2
Note: Updated 01/18/22
What
jobs in information security is this?
Salary:
$103,560 Responsibilities:
Software developers can be tasked with a wide range of responsibilities that
may include designing parts of computer programs and applications and
designing how those pieces work together. |
Software developer |
Disruptions
in their day-to-day business: Time is money. |
True |
First
Reason why investing in information security is significant |
Rising
cost of breaches |
Third
Reason why investing in information security is significant |
Proliferation
of IoT devices |
Feeling
confident about their organization's security level: When information
security community members participated in the Cybersecurity Trends Report,
they were asked how positive they felt about their security stance. |
True |
Second
Reason why investing in information security is significant |
Increasingly
sophisticated attacker |
What
jobs in information security is this?
Salary:
$95,510 Responsibilities:
Information security analysts monitor their companies' computer networks to
combat hackers and compile reports of security breaches. |
Information
Security Analyst |
What
jobs in information security is this?
Salary:
$104,000 Responsibilities: Create an in-office network for a small business
or a cloud infrastructure for a business with corporate locations in cities
on opposite coasts. |
Computer
Network Architects |
Fifth
Reason why investing in information security is significant |
Regulatory
compliances |
The
need for skilled workers and allocation of funds for security within their
budget: Companies are making the effort to allocate more funds in their
budgets for security. |
True |
Fourth
Reason why investing in information security is significant |
Funded
hackers and wide availability of hacking tool |
What
jobs in information security is this?
Salary:
$139,000 Responsibilities: Information systems
managers work toward ensuring a company's tech is capable of meeting their IT
goals. |
Computer
and Information Systems Managers |
Second
Reason why investing in information security is significant |
Increasingly
sophisticated attacker |
Fourth
Reason why investing in information security is significant |
Funded
hackers and wide availability of hacking tool |
Third
Reason why investing in information security is significant |
Proliferation
of IoT devices |
Fifth
Reason why investing in information security is significant |
Regulatory
compliances |
First
Reason why investing in information security is significant |
Rising
cost of breaches |
What
jobs in information security is this?
Salary:
$104,000 Responsibilities:
Create an in-office network for a small business or a cloud infrastructure
for a business with corporate locations in cities on opposite coasts |
Computer
Network Architects |
Feeling
confident about their organization's security level: When information
security community members participated in the Cybersecurity Trends Report,
they were asked how positive they felt about their security stance. |
True |
Information
is one of the most significant ______ resources. |
non-substantial |
20
different risk markers grouped under five main categories |
Security,
Medical, Political, Environmental and Infrastructural Risks |
The
requirements for applications that are connected to _____ will differ from
those for applications without such interconnection. |
external
systems |
__________:controlling
who gets to read information |
Confidentiality |
For
a ________ , the chief concern may be ensuring the confidentiality of
classified information, whereas a funds transfer system may require strong
integrity controls |
national
defense system |
_______
: assuring that authorized users have continued access to information and
resources |
Availability |
________
:assuring that information and programs are changed only in a specified and
authorized manner. |
Integrity |
The
weight given to each of the three major requirements describing needs for
information security—confidentiality, integrity, and availability—depends
strongly on |
circumstances |
With
__________ attacks, for example, even legitimate and honest users of an owner
mechanism can be tricked into disclosing secret data. |
Trojan
horse |
A
______ that must be restored within an
hour after disruption represents, and requires, a more demanding set of
policies and controls than does a similar system that need not be restored
for two to three days. |
system |
Early
disclosure may jeopardize______ advantage, but disclosure just before the
intended announcement may be insignificant. |
competitive
|
is
a requirement whose purpose is to keep sensitive information from being
disclosed to unauthorized recipients. |
Confidentiality |
In
any particular circumstance, some threats are more probable than others, and
a______ must assess the threats, assign a level of concern to each, and state
a policy in terms of which threats are to be resisted. |
prudent
policy setter |
may
prevent people from doing unauthorized things but cannot prevent them from
doing things that their job functions entitle them to do. |
Technical
measure |
Computers
are ______ entities, and programs can be changed in a twinkling, so that past
happiness is no predictor of future bliss. |
active |
As
viruses have escalated from a hypothetical to a commonplace threat, it has
become necessary to rethink such policies in regard to methods of
distribution and acquisition of |
software |
To
be useful, a ______ must not only
state the security need (e.g., for confidentiality—that data shall be
disclosed only to authorized individuals), but also address the range of
circumstances under which that need must be met and the associated operating
standards. |
Security
policy |
The
framework within which an organization strives to meet its needs for
information security is codified as _____ |
Security
policy |
Some
____are explicitly concerned with protecting information and information
systems, but the concept of management controls includes much more than a
computer's specific role in enforcing security. |
management
controls |
_________
are the mechanisms and techniques—administrative, procedural, and
technical—that are instituted to implement a security policy |
Management
controls |
An
effective ________ controls is needed to cover all aspects of information
security, including physical security, classification of information, the
means of recovering from breaches of security, and above all training to
instill awareness and acceptance by people. |
program
of management |
A
major conclusion of this report is that the lack of a clear_____of security
policy for general computing is a major impediment to improved security in
computer systems. |
articulation |
One
can implement that policy by taking specific actions guided by management
control principles and utilizing specific security standards, procedures, and |
mechanisms |
The_____must
be managed by auditing, backup, and recovery procedures supported by general
alertness and creative responses. |
residual
risk |
An
_____ must have administrative procedures in place to bring peculiar actions
to the attention of someone who can legitimately inquire into the
appropriateness of such actions, and that person must actually make the
inquiry. |
organization |
A
______ is a concise statement, by those responsible for a system (e.g.,
senior management), of information values, protection responsibilities, and
organizational commitment. |
security
policy |
refers
to the protection of hardware, software, and data against physical threats to
reduce or prevent disruptions to operations and services and loss of
assets.”. |
Physical
security |
security
measures to establish the validity of a transmission, message, or originator. |
Authentication |
a
data endowed with relevance and purpose. |
Information |
assurance
that the sender is provided with proof of a data delivery and recipient is
provided with proof of the sender’s identity, so that neither can later deny
having processed the data. |
Non-repudiation |
timely,
reliable access to data and information services for authorized users. |
Availability |
assurance
that information is not disclosed to unauthorized persons. |
Confidentiality |
protection
against unauthorized modification or destruction of information |
Integrity |
a
variety of ongoing measures taken to reduce the likelihood and severity of
accidental and intentional alteration, destruction, misappropriation, misuse,
misconfiguration, unauthorized distribution, and unavailability of an
organization’s logical and physical assets, as the result of action or
inaction by insiders and known outsiders, such as business partners.” |
Personnel
security |
is
the study of how to protect your information assets from destruction,
degradation, manipulation and exploitation. But also, how to recover should
any of those happen. |
Information
Assurance |
According
to _______ IA has four major categories: physical security personnel security
IT security operational security. |
Debra
Herrmann |
Criminals
are constantly surveying the environment for an opportunity to commit crimes. |
True |
While
you are walking, keep your mind on what is going on around you. |
True |
Walk
without purpose, scan the area around you and make casual eye contact with
others to display confidence. |
False |
Carrying
items makes you more vulnerable targets for criminals. |
True |
If
you have an intuitive feeling something is wrong, trust your instincts. |
True |
If
you feel vulnerable do not ask Police or Security to escort you to your car |
False |
Always
closely guard their personal effects when it comes to identity theft. |
True |
Theft
of personal items such as pursues can result in more criminal opportunities
such as: |
Identity
Theft, Stolen Auto, Residential Burglary |
Method
of reducing criminal opportunity. |
Be
alert and aware, Display confidence, Keep your hands free, Trust your
instincts, Ask for help, Closely Guard your personal Effects |
Types
of private security. |
Technology,
Private Alarm Response, Private Patrol Services, Private Security Guards |
involves
the implementation of standard operational security procedures that define
the nature and frequency of the interaction between users, systems, and
system resources, the purpose. |
Operational
security |
According
to _____ , IA can be thought of as protecting information at three distinct
levels. |
Blyth
and Kovacich |
Information
and data manipulation abilities in cyberspace. |
information
infrastructure |
Knowledge
and understanding in human decision space. |
perceptual |
Raw facts with a known coding system |
Data |
Accepted
facts, principles, or rules of thumb that are useful for specific domains. |
Knowledge |
the
inherent technical features and functions that collectively contribute to an
IT infrastructure achieving and sustaining confidentiality, integrity,
availability, accountability, authenticity, and reliability.” |
IT
security |
Data
and data processing activities in physical space. |
physical |
_______
is a weakness or fault in a system that exposes information to attack. |
Vulnerability |
for
assets are one that has known threats |
hostile
environment |
is
a nonhostile environment that may be protected from external hostile elements
by physical, personnel, and procedural countermeasures. |
Benign
environment |
According
to ______taxonomy of information security, a computing environment is made up
of five continuously interacting components |
Raggad’s |
Raw
facts with an unknown coding system |
Noise |
is
a collection of computing environments connected by one or more internal
networks under the control of a single authority and security policy,
including personnel and physical security. |
enclave |
Processed
data |
Information |
is
all about protecting data that is found in electronic form (such as
computers, servers, networks, mobile devices, etc.) from being compromised or
attacked. |
Cybersecurity |
Info
security is concerned with making sure data in any form is kept secure and is
a bit broader than |
cybersecurity |
is
another way of saying “data security.” |
Information
security |
The
process to protect that data requires more advanced |
IT
security tool |
Match
the term/details to complete each statement. |
|
Cybersecurity
professionals traditionally understand the technology, firewalls, and
intrusion protection systems needed, but weren’t necessarily brought up in
the ___________________. |
data
evaluation business |
Over
the last decade, we’ve seen a _________________ between cybersecurity and
information security, as these previously siloed positions have come
together. |
fusion |
Both
individuals need to know what data is most critical to the organization so
they can focus on placing the right ____________________ and monitoring
controls on that data. |
cyber
risk management |
In
some scenarios, an __________________ would help a cybersecurity professional
prioritize data protection — and then the cybersecurity professional would
determine the best course of action for the data protection. |
information
security professional |
If
your data is stored physically or digitally, you need to be sure you have all
the right ____________________ in place to prevent unauthorized individuals
from gaining access. |
physical
access controls |
IT security can probably be used interchangeably with cybersecurity,
computer security and information security if ___________________. |
it
pertains to business |
___________________
or security ratings are the cyber equivalent of a credit score. |
Cybersecurity
ratings |
IT
is the ___________________for practical purposes, largely for industry
(mainframes, supercomputers, datacentres, servers, PCs and mobile devices as
endpoints for worker interaction) and consumers (PCs, mobile devices, IoT
devices, and video game console endpoints for enduser lifestyles.) |
application
of computer science |
Computer
security and cybersecurity are completely ___________________, and require
digital computer technology from 1946’s ENIAC to now. |
interchangeable
terms |
Ensuring
proper HTTPS implementation for an ecommerce website or mobile app falls
under cybersecurity and computer security, so it’s ___________________. |
information
security |
Keeping
information___________________ electronic computers (such as ancient
cryptography) to this very day falls under the banner of information
security. |
secure
for the history of data predating |
sing
this high-level, objectively-derived data can simplify the
______________________ around risk. |
conversation |
Because
ratings are easy to understand, they are a useful mechanism for
____________________ and vendor risk to a non-technical audience in the
C-suite, boardroom, or with the vendor in question. |
communicating
internal |
Business
partners and investors are increasingly aware of the importance of this
topic, and companies are asked regularly about their effectiveness in
securing data and managing both ___________________. |
physical
and cyber risk |
Computer
security and cybersecurity are both children of ______________________. |
information
security |
Layer
describes the notion that the physical access to any system, server,
computer, data center, or another physical object storing confidential
information has to be constrained to business ought-to-know. |
Physical
Access |
Feeling
confident about their organization's security level: When information
security community members participated in the Cybersecurity Trends Report,
they were asked how positive they felt about their security stance. |
True |
Both
individuals need to know what data is most critical to the organization so
they can focus on placing the right ____________________ and monitoring
controls on that data. |
cyber
risk management |
If
your data is stored physically or digitally, you need to be sure you have all
the right ____________________ in place to prevent unauthorized individuals
from gaining access. |
physical
access controls |
Cybersecurity
professionals traditionally understand the technology, firewalls, and
intrusion protection systems needed, but weren’t necessarily brought up in
the ___________________. |
data
evaluation business |
In
some scenarios, an __________________ would help a cybersecurity professional
prioritize data protection — and then the cybersecurity professional would
determine the best course of action for the data protection. |
information
security professional |
Over
the last decade, we’ve seen a _________________ between cybersecurity and
information security, as these previously siloed positions have come together. |
fusion |
The
requirements for applications that are connected to ________ will differ from
those for applications without such interconnection. |
external
systems |
Layer
describes the notion that data ought to be secured while in motion. |
data
in motion |
please update for new answers because there's no answer in any of this on my midterm exam
ReplyDelete