100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CYBR 3100 Test 1 Study Guide $11.49   Add to cart

Exam (elaborations)

CYBR 3100 Test 1 Study Guide

 0 view  0 purchase
  • Course
  • CYBR
  • Institution
  • CYBR

©THESTAR EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 1 | P a g e CYBR 3100 Test 1 Study Guide Computer security - answerIn the early days of computers, this term specified the need to secure the physical location of computer technology from outside threats. This term later came to represen...

[Show more]

Preview 3 out of 21  pages

  • November 24, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CYBR
  • CYBR
avatar-seller
TheStar
©THESTAR EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.



CYBR 3100 Test 1 Study Guide

Computer security - answer✔In the early days of computers, this term specified the need to
secure the physical location of computer technology from outside threats. This term later came
to represent all actions taken to preserve computer systems from losses. It has evolved into the
current concept of information security as the scope of protecting information in an
organization has expanded.

C.I.A. triad - answer✔The industry standard for computer security since the development of the
mainframe. The standard is based on three characteristics that describe the utility of
information: confidentiality, integrity, and availability

communications security - answer✔The protection of all communications media, technology,
and content

information security - answer✔Protection of the confidentiality, integrity, and availability of
information assets, whether in storage, processing, or transmission, via the application of
policy, education, training and awareness, and technology.

network security - answer✔A subset of communications security; the protection of voice and
data networking components, connections, and content

security - answer✔A state of being secure and free from danger or harm. Also, the actions
taken to make someone or something secure

accuracy - answer✔An attribute of information that describes how data is free of errors and has
the value that the user expects

authenticity - answer✔An attribute of information that describes how data is genuine or
original rather than reproduced or fabricate

availability - answer✔An attribute of information that describes how data is accessible and
correctly formatted for use without interference or obstruction

confidentiality - answer✔An attribute of information that describes how data is protected from
disclosure or exposure to unauthorized individuals or systems.

integrity - answer✔An attribute of information that describes how data is whole, complete, and
uncorrupted.

1|Page

, ©THESTAR EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
personally identifiable information (PII) - answer✔A set of information that could uniquely
identify an individual.

possession - answer✔An attribute of information that describes how the data's ownership or
control is legitimate or authorized.

utility - answer✔An attribute of information that describes how data has value or usefulness for
an end purpose.

McCumber Cube - answer✔A graphical representation of the architectural approach widely
used in computer and information security; commonly shown as a cube composed of 3 3 3 cells,
similar to a Rubik's Cube

information system (IS) - answer✔The entire set of software, hardware, data, people,
procedures, and networks that enable the use of information resources in the organization.

physical security - answer✔The protection of physical items, objects, or areas from
unauthorized access and misuse.

bottom-up approach - answer✔A method of establishing security policies and/or practices that
begins as a grassroots effort in which systems administrators attempt to improve the security of
their systems.

top-down approach - answer✔A methodology of establishing security policies and/or practices
that is initiated by upper management.

systems development life cycle (SDLC) - answer✔A methodology for the design and
implementation of an information system. The SDLC contains different phases depending on
the methodology deployed, but generally the phases address the investigation, analysis, design,
implementation, and maintenance of an information system.

methodology - answer✔A formal approach to solving a problem based on a structured
sequence of procedures.

waterfall model - answer✔A type of SDLC in which each phase of the process "flows from" the
information gained in the previous phase, with multiple opportunities to return to previous
phases and make adjustments.

software assurance (SA) - answer✔A methodological approach to the development of software
that seeks to build security into the development life cycle rather than address it at later stages.
SA attempts to intentionally create software free of vulnerabilities and provide effective,
efficient software that users can deploy with confidence.



2|Page

, ©THESTAR EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
chief information officer (CIO) - answer✔An executive-level position that oversees the
organization's computing technology and strives to create efficiency in the processing and
access of the organization's information

chief information security officer (CISO) - answer✔Typically considered the top information
security officer in an organization. The CISO is usually not an executive-level position, and
frequently the person in this role reports to the CIO.

project team - answer✔A small functional team of people who are experienced in one or
multiple facets of the required technical and nontechnical areas for the project to which they
are assigned.

data custodians - answer✔Individuals who work directly with data owners and are responsible
for storage, maintenance, and protection of information

data owners - answer✔Individuals who control, and are therefore responsible for, the security
and use of a particular set of information; data owners may rely on custodians for the practical
aspects
of protecting their information, specifying which users are authorized to access it, but they are
ultimately responsible for it.

data users - answer✔Internal and external stakeholders (customers, suppliers, and employees)
who interact with information in support of their organization's planning and operations

community of interest - answer✔A group of individuals who are united by similar interests or
values within an organization and who share a common goal of helping the organization to
meet its objectives

data - answer✔Items of fact collected by an organization. Data includes raw numbers, facts,
and words. Student quiz scores are a simple example of data.

information - answer✔Data that has been organized, structured, and presented to provide
additional insight into its context, worth, and usefulness. For example, a student's class average
can be presented in the context of its value, as in "90 = A."

information asset - answer✔The focus of information security; information that has value to
the organization, and the systems that store, process, and transmit the information

media - answer✔As a subset of information assets, the systems and networks that store,
process, and transmit information.




3|Page

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TheStar. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

58993 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart