100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Introduction To Information Security – Q/A 100% Correct $9.99   Add to cart

Exam (elaborations)

Introduction To Information Security – Q/A 100% Correct

 3 views  0 purchase
  • Course
  • Institution

Introduction To Information Security – Q/A 100% Correct

Preview 2 out of 5  pages

  • January 3, 2024
  • 5
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Introduction To Information Security – Q/A
100% Correct

1) Maintenance and change: Consists of tasks necessary to support and
modify system for remainder of its useful life

2) Implementation: Needed software created; components ordered, received,
assembled, and tested

3) Physical design: Technologies to support the alternatives identified and
evaluated in the logical design are selected

Analysis: Consists of assessments of the organization, status of current
systems, and capability to support proposed systems ✔️Ans - Software
maintenance is the last phase of the SDLC, name the three kinds of software
maintenance and describe and give an example of each?

access ✔️Ans - A subject or object's ability to use, manipulate, modify, or
affect another subject or object

accuracy ✔️Ans - An attribute of information that describes how data is free
of errors and has the value that the user expects.

Asset ✔️Ans - The organizational resource that is protected.

Attack ✔️Ans - An intentional or unintentional act that can damage or
otherwise compromise information and the systems that support it.

authenticity ✔️Ans - An attribute of information that describes how data is
genuine original rather than reproduced or fabricated.

availability ✔️Ans - An attribute of information that describes how data is
protected from disclosure or exposure to unauthorized individuals or
systems.

bottom-up approach ✔️Ans - A method of establishing security policies that
begins as a grassroots effort in which systems administrators attempt to
improve the security of their systems.

, C.I.A. triangle ✔️Ans - The industry standard for computer security since the
development of the miniframe. The standard is based on three characteristics
that describe the utility information: confidentiality, integrity, and availability.

chief information office (CIO) ✔️Ans - An executive-level position that
oversees the organization's computing technology and strives to create
efficiency in the processing and access of the organization's information.

chief information security officer (CISO) ✔️Ans - typically considered the
top information security officer in an organization.

communications security ✔️Ans - The protection of all communications
media, technology, and content.

community of interest ✔️Ans - A group of people who are united by similar
interests or values within an organization and who share a common goal of
helping the organization to meet its objectives

computer security ✔️Ans - In the early days of the computers, this term
specified the need to secure the need to secure the physical location of
computer technology from outside threats.

Control, safeguard, or countermeasure ✔️Ans - Security mechanisms,
policies, or procedures that can successfully counter attacks, reduce risk,
resolve vulnerabilities, and otherwise improve security within an
organization.

data custodians ✔️Ans - people who are responsible for the storage,
maintenance, and protection of information.

data owners ✔️Ans - People who own the information and thus determine
the level of classification for their data and approve its access authorization.

data users ✔️Ans - People who work with the information to perform their
daily jobs and support the mission of the organization.

determine how the proposed system will solve the problem ✔️Ans - Which
of the following tasks are completed in the investigation phase of the SDLC?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart