INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
0 keer bekeken 0 keer verkocht
Vak
INF4831
Instelling
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
Preventing physical access to a server by an unauthorized individual
What is the primary security concern for a system administrator? (10)
A user can install a wireless access point so that they can access t...
inf4831 information security questions and answers
Geschreven voor
INF4831
Alle documenten voor dit vak (31)
Verkoper
Volgen
SUPERGRADES01
Ontvangen beoordelingen
Voorbeeld van de inhoud
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
Signals intelligence
The collection, analysis, and distribution of information from foreign communications
networks for intelligence and counterintelligence purposes and in support of military
operations.
Cultural Mores
fixed moral attitudes or customs of a particular group
Ethics
The branch of philosophy that considers nature, criteria, sources, logic, and the validity
of moral judgment.
Laws
Rules that mandate or prohibit certain behavior and are enforced by the state.
due care
Measures that an organization takes to ensure every employee knows what is
acceptable and what is not.
due diligence
reasonable steps taken by people or organizations to meet the obligations imposed by
laws or regulations
jurisdiction
the power to make legal decisions
liability
an entity's legal obligation or responsibility
long-arm jurisdiction
The ability of a legal entity to exercise its influence beyond its normal boundaries by
asserting a connection between an out-of-jurisdiction entity and a local legal case.
restitution
A legal requirement to make compensation or payment resulting from a loss or injury.
policy
Guidelines that dictate certain behavior within the organization.
aggregate information
Collective data that relates to a group or category of people and that has been altered to
remove characteristics or components that make it possible to identify individuals within
the group.
information aggregation
Pieces of nonprivate data that, when combined, may create information that violates
privacy.
privacy
In the context of information security, the right of individuals or groups to protect
themselves and their information from unauthorized access, providing confidentiality.
Identity theft
The unauthorized taking of personally identifiable information with the intent of
committing fraud and abuse of a person ' s financial and personal reputation,
, purchasing goods and services without authorization, and generally impersonating the
victim for illegal or unethical purposes.
Information assurance
The affirmation or guarantee of the confidentiality, integrity, and availability of
information in storage, processing, and transmission.
CIA Triad
The industry standard for computer security since the development of the mainframe.
The standard is based on three characteristics that describe the utility of information:
confidentiality, integrity, and availability.
Communications security
The protection of all communications media, technology, and content
Information security
Protection of the confidentiality, integrity, and availability of information assets, whether
in storage, processing, or transmission, via the application of policy, education, training
and awareness, and technology.
Network security
A subset of communications security; the protection of voice and data networking
components, connections, and content.
Security
A state of being secure and free from danger or harm. Also, the actions to make
someone or something secure.
Accuracy
An attribute of information that describes how data is free of errors and has the value
that the user expects.
Authenticity
An attribute of information that describes how data is genuine or original rather than
reproduced or fabricated.
Availability
An attribute of information that describes how data is accessible and correctly formatted
for use without interference or obstruction.
Confidentiality
An attribute of information that describes how data is protected from disclosure or
exposure to unauthorised individuals or systems.
Integrity
An attribute of information that describes how data is whole, complete and uncorrupted.
Personally Identifiable Information (PII)
A set of information that could uniquely identify an individual.
Possession
an attribute of information that describes how the data's ownership or control is
legitimate or authorized.
Utility
An attribute of information that describes how data has value or usefulness for an end
purpose.
McCumber Cube
A graphical representation of the architectural approach widely used in computer and
information security.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper SUPERGRADES01. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €8,29. Je zit daarna nergens aan vast.