Front | Back |
Information has ______ when it is whole, complete, and uncorrupted.
|
Integrity
|
In an organization, the value of _________ of information is especially high when it involves personal information about employees, customers, or patients.
|
Confidentiality
|
A computer is the _______ of an attack when it is the target entity.
|
Object
|
In the ___ _____ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
|
Top-down
|
During the ____ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
|
Cold
|
The ______ component of the IS comprises applications, operating systems, and assorted command utilities.
|
Software
|
The senior technology officer is typically the chief ______ officer.
|
Information
|
A frequently overlooked component of an IS, _____ are written instructions for accomplishing a specific task.
|
Procedures
|
The CNSS model of information security evolved from a concept developed by the computer security industry known as the _____ triangle.
|
CIA
|
A(n) _______ information security policy outlines the implementation of a security program within the organization.
|
Enterprise
|
A(n) ________ is a formal approach to solving a problem by means of a structured sequence of procedures.
|
Methodology
|
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ______ .
|
Network
|
The ______ of information is the quality or state of ownership or control of some object or item.
|
Possession
|
________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
|
Authenticity
|
_________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format.
|
Availability
|