Answer the Following Principles of Information Security (Infosec) Flashcards

Explore and answer Answer the Following Principles of Information Security (Infosec) Chapter 1, and much more with the given flashcards. Learn key terms, words, definitions, and much more about the Following Principles of Information Security (Infosec) with our flashcard quizzes. Attempt these simple quizzes with ease and grow.

20 cards   |   Total Attempts: 206
  

Related Topics

Cards In This Set

Front Back
Information has ______ when it is whole, complete, and uncorrupted.
Integrity
In an organization, the value of _________ of information is especially high when it involves personal information about employees, customers, or patients.
Confidentiality
A computer is the _______ of an attack when it is the target entity.
Object
In the ___ _____ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Top-down
During the ____ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Cold
The ______ component of the IS comprises applications, operating systems, and assorted command utilities.
Software
The senior technology officer is typically the chief ______ officer.
Information
A frequently overlooked component of an IS, _____ are written instructions for accomplishing a specific task.
Procedures
The CNSS model of information security evolved from a concept developed by the computer security industry known as the _____ triangle.
CIA
A(n) _______ information security policy outlines the implementation of a security program within the organization.
Enterprise
A(n) ________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Methodology
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ______ .
Network
The ______ of information is the quality or state of ownership or control of some object or item.
Possession
________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
Authenticity
_________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format.
Availability