INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
1 view 0 purchase
Course
INF4831
Institution
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
Preventing physical access to a server by an unauthorized individual
What is the primary security concern for a system administrator? (10)
A user can install a wireless access point so that they can access t...
inf4831 information security questions and answers
Written for
INF4831
All documents for this subject (31)
Seller
Follow
SUPERGRADES01
Reviews received
Content preview
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
Signals intelligence
The collection, analysis, and distribution of information from foreign communications
networks for intelligence and counterintelligence purposes and in support of military
operations.
Cultural Mores
fixed moral attitudes or customs of a particular group
Ethics
The branch of philosophy that considers nature, criteria, sources, logic, and the validity
of moral judgment.
Laws
Rules that mandate or prohibit certain behavior and are enforced by the state.
due care
Measures that an organization takes to ensure every employee knows what is
acceptable and what is not.
due diligence
reasonable steps taken by people or organizations to meet the obligations imposed by
laws or regulations
jurisdiction
the power to make legal decisions
liability
an entity's legal obligation or responsibility
long-arm jurisdiction
The ability of a legal entity to exercise its influence beyond its normal boundaries by
asserting a connection between an out-of-jurisdiction entity and a local legal case.
restitution
A legal requirement to make compensation or payment resulting from a loss or injury.
policy
Guidelines that dictate certain behavior within the organization.
aggregate information
Collective data that relates to a group or category of people and that has been altered to
remove characteristics or components that make it possible to identify individuals within
the group.
information aggregation
Pieces of nonprivate data that, when combined, may create information that violates
privacy.
privacy
In the context of information security, the right of individuals or groups to protect
themselves and their information from unauthorized access, providing confidentiality.
Identity theft
The unauthorized taking of personally identifiable information with the intent of
committing fraud and abuse of a person ' s financial and personal reputation,
, purchasing goods and services without authorization, and generally impersonating the
victim for illegal or unethical purposes.
Information assurance
The affirmation or guarantee of the confidentiality, integrity, and availability of
information in storage, processing, and transmission.
CIA Triad
The industry standard for computer security since the development of the mainframe.
The standard is based on three characteristics that describe the utility of information:
confidentiality, integrity, and availability.
Communications security
The protection of all communications media, technology, and content
Information security
Protection of the confidentiality, integrity, and availability of information assets, whether
in storage, processing, or transmission, via the application of policy, education, training
and awareness, and technology.
Network security
A subset of communications security; the protection of voice and data networking
components, connections, and content.
Security
A state of being secure and free from danger or harm. Also, the actions to make
someone or something secure.
Accuracy
An attribute of information that describes how data is free of errors and has the value
that the user expects.
Authenticity
An attribute of information that describes how data is genuine or original rather than
reproduced or fabricated.
Availability
An attribute of information that describes how data is accessible and correctly formatted
for use without interference or obstruction.
Confidentiality
An attribute of information that describes how data is protected from disclosure or
exposure to unauthorised individuals or systems.
Integrity
An attribute of information that describes how data is whole, complete and uncorrupted.
Personally Identifiable Information (PII)
A set of information that could uniquely identify an individual.
Possession
an attribute of information that describes how the data's ownership or control is
legitimate or authorized.
Utility
An attribute of information that describes how data has value or usefulness for an end
purpose.
McCumber Cube
A graphical representation of the architectural approach widely used in computer and
information security.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.