Information Technology > QUESTIONS & ANSWERS > WGU - C836 Fundamentals of Information security Terms, top questions and answers, rated A+ (All)

WGU - C836 Fundamentals of Information security Terms, top questions and answers, rated A+

Document Content and Description Below

WGU - C836 Fundamentals of Information security Terms, top questions and answers, rated A+ Protecting information and information systems from unauthorized access, use, disclosure, disruption, ... modification, or destruction - ✔✔-Information Security Companies that process credit card payments must comply with this set of standards - ✔✔-Payment Card Industry Data Security Standard (PCI DSS) Used to keep something private or minimally known - ✔✔-Confidentially Refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner. - ✔✔-Integrity Refers to the ability to access our data when we need it - ✔✔-Availability A type of attack, primarily against confidentiality - ✔✔-Interception Something that has the potential to cause harm to our assets - ✔✔-Threat A weakness that can be used to harm us - ✔✔-Vulnerability The likelihood that something bad will happen - ✔✔-Risk An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis - ✔✔-Interruption attack An attack that involves tampering with our assets - ✔✔-Modification attack A model that adds three more principles to the CIA triad: Possession or Control, Authenticity, and Utility - ✔✔-Parkerian hexad The physical disposition of the media on which the data is stored - ✔✔-possession or control Allows for attribution as to the owner or creator of the data in question - ✔✔-Authenticity Refers to how useful the data is to us - ✔✔-Utility An attack that involves generating data, processes, communications, or other similar activities with a system - ✔✔-Fabrication attack One of the first and most important steps of the risk management process - ✔✔-Identify assets A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail - ✔✔-defense in depth Based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature - ✔✔- administrative controls Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data - ✔✔-logical controls Controls that protect the physical environment in which our systems sit, or where our data is stored - ✔✔-physical controls Involves putting measures in place to help ensure that a given type of threat is accounted for - ✔✔- migrating risk The risk management phase that consists of all of the activities that we can perform in advance of the incident itself, in order to better enable us to handle it - ✔✔-preparation phase The risk management phase where we detect the occurrence of an issue and decide whether it is actually an incident so that we can respond to it appropriately - ✔✔-detection and analysis phase The risk management phase where we determine specifically what happened, why it happened, and what we can do to keep it from happening again - ✔✔-Post-incident activity phase To completely remove the effects of the issue from our environment - ✔✔-Eradication Taking steps to ensure that the situation does not cause any more damage than it already has, or at the very least, lessen any ongoing harm - ✔✔-Containment Restore to a better state (either to the state prior to the incident, or if we did not detect the problem immediately, prior to when the issue started) - ✔✔-recover Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards - ✔✔-Identity verification Authentication requirements help prevent this crime - ✔✔-Falsifying identification A set of methods we use to establish a claim of identity as being true - ✔✔-Authentication A password is an example of this type of factor - ✔✔-Something you know An iris scan is an example of this type of factor - ✔✔-Something you are A swipe card is an example of this type of factor - ✔✔-Something you have The time delay between your keystrokes is an example of this type of factor - ✔✔-Something you do Being at a specific terminal is an example of this type of factor - ✔✔-where you are Uses one or more authentication methods for access - ✔✔-multi-factor authentication An authentication mechanism in which both parties authenticate each other - ✔✔-mutual authentication Elements of a complex password - ✔✔-A password that is a combination of uppercase letters, lowercase letters, numbers, and symbols, such as punctuation marks Unique personal characteristics, such as fingerprints, used for identification purposes - ✔✔-Biometrics A stipulation that our chosen biometric characteristic should be present in the majority of people we expect to enroll in the system - ✔✔-Universality A measure of the differences of a particular characteristic among a group of individuals - ✔✔- Uniqueness How well a particular characteristic resists change over time and with advancing age - ✔✔-Permanence How easy it is to acquire a characteristic that we can later use to authenticate a user - ✔✔-collect ability A set of metrics that judge how well a given system functions - ✔✔-performance measurement A measure of how agreeable a particular characteristic is to the users of a system - ✔✔-acceptability Describes the ease with which a system can be tricked by a falsified biometric identifier - ✔✔- Circumvention The rate at which we accept users whom we should actually have rejected - ✔✔-False acceptance rate (FAR) The rate at which we reject legitimate users when we should have accepted them - ✔✔-False rejection rate (FRR) Enables us to determine what users are allowed to do - ✔✔-Authorization States that we should allow only the bare minimum access required in order for a given party (person, user account, or process) to perform a needed functionality - ✔✔-Principle of Least Privilege The act of doing something that is prohibited by a law or rule - ✔✔-violation An act that grants a particular party access to a given resource - ✔✔-allowing access An act that prevents a party from accessing something, such as logging on to a machine or entering the lobby of our building after hours - ✔✔-denying access An act that allows some access to a given resource, but only up to a certain point - ✔✔-limiting access A set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate - ✔✔-Sandbox The ability to remove access from a resource at any point in time - ✔✔-Revocation Typically built to a certain resource, these contain the identifiers of the party allowed to access the resource and what the party is allowed to do. - ✔✔-Access control lists (ACLs) In this method of security, a person's capabilities are oriented around the use of a token that controls their access (e.g. a personal badge) - ✔✔-Capability-based security A type of attack that is more common in systems that use ACLs rather than capabilities - ✔✔-The confused deputy problem A type of attack that misuses the authority of the browser on the user's computer - ✔✔-Cross-site request forgery (CSRF) A client-side attack that takes advantage of some of the page rendering features that are available in newer browsers - ✔✔-Clickjacking Access is determined by the owner of the resource in question - ✔✔-Discretionary access control (DAC) Similar to MAC in that access controls are set by an authority responsible for doing so, rather than by the owner of the resource. In this model, access is based on the role the individual is performing - ✔✔- Role-based access control (RBAC) Access is based on attributes (of a person, a resource, or an environment) - ✔✔-Attribute-based access control Attributes of a particular individual, such as height - ✔✔-Subject attributes Attributes that relate to a particular resource, such as operating system or application - ✔✔-Resource attributes Attributes that relate to environmental conditions, such as time of day or length of time - ✔✔- Environmental attributes Designed to prevent conflicts of interest; commonly used in industries that handle sensitive data. Three main resource classes are considered in this model: objects, company groups, and conflict classes. - ✔✔- The Brewer and Nash model A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two security properties define how information can flow to and from the resource: the simple security property and the * property. - ✔✔-The Bell-LaPadula model Primarily concerned with protecting the integrity of data, even at the expense of confidentiality. Two security rules: the simple integrity axiom an [Show More]

Last updated: 1 year ago

Preview 1 out of 21 pages

Reviews( 0 )

Recommended For You

 *NURSING> QUESTIONS & ANSWERS > Basic Life Support Exam A (25 questions). Questions and answers, Graded A+. 2022 /2023 update. (All)

preview
Basic Life Support Exam A (25 questions). Questions and answers, Graded A+. 2022 /2023 update.

Basic Life Support Exam A (25 questions) Please do not mark on this exam. Record the best answer on the separate answer sheet. 1. While performing high-quality CPR on an adult, what action should y...

By bundleHub Solution guider , Uploaded: Aug 30, 2022

$9.5

 Health Care> QUESTIONS & ANSWERS > Christopher Parrish Documentation Assignments; questions and answers, complete solution (All)

preview
Christopher Parrish Documentation Assignments; questions and answers, complete solution

Christopher Parrish Documentation Assignments 1. Document your focused gastrointestinal and dietary assessment of Christopher Parrish. o Obtain vital signs o Assess bowel sounds and when last bowe...

By QuizGuider82 , Uploaded: Feb 01, 2022

$9

 Health Care> QUESTIONS & ANSWERS > Xcel Final Exam Questions and answers, 2022/2023 predictor questions. Graded A+ (All)

preview
Xcel Final Exam Questions and answers, 2022/2023 predictor questions. Graded A+

Xcel Final Exam Questions and answers, 2022/2023 predictor questions. Graded A+ Typically, Long-Term Disability benefits are coordinated with which benefit plan? - ✔✔Social Security The focus...

By bundleHub Solution guider , Uploaded: Sep 01, 2022

$11.5

 English> QUESTIONS & ANSWERS > Kaplan LSAT Prep. LSAT Prep Courses. Top questions and answers, Verified for Exam Revision (All)

preview
Kaplan LSAT Prep. LSAT Prep Courses. Top questions and answers, Verified for Exam Revision

Kaplan LSAT Prep, top questions and answers, Verified for Exam Revision Question Stem: "Which one of the following must be true?" - ✔✔-Correct answer: must be true Wrong answers: Must be false Qu...

By Topmark , Uploaded: Mar 12, 2023

$12.5

 Linguistics> QUESTIONS & ANSWERS > LETRS Units 5 - 8 Pre & Post Test, Questions and answers, rated A. 2022/2023. Latest updates (All)

preview
LETRS Units 5 - 8 Pre & Post Test, Questions and answers, rated A. 2022/2023. Latest updates

LETRS Units 5 - 8 Pre & Post Test, Questions and answers, rated A. 2022/2023. Latest updates Once students decode well, which statement describes the relationship between vocabulary and reading c...

By Topmark , Uploaded: Oct 07, 2022

$7

 *NURSING> QUESTIONS & ANSWERS > NREMT Exam_National Registry of Emergency Medical Technicians Exam. 150 Questions and Answers, 2022/2023 update, GRADED A (All)

preview
NREMT Exam_National Registry of Emergency Medical Technicians Exam. 150 Questions and Answers, 2022/2023 update, GRADED A

150 NREMT Exam Questions and Answers Which of the following is an example of an unsafe scene for an EMT-Basic to enter? A. Fifty-four-year old male with difficulty breathing B. Twenty-three-year o...

By bundleHub Solution guider , Uploaded: Sep 19, 2022

$11.5

 *NURSING> QUESTIONS & ANSWERS > NASM CPT EXAM, Questions and answers, 2022 update, Graded A+. (All)

preview
NASM CPT EXAM, Questions and answers, 2022 update, Graded A+.

NASM CPT EXAM, Questions and answers, 2022 update, Graded A+. Name the structures that make up the lumbo-pelvic-hip complex (LPHC). - ✔✔Lumbar spine, pelvic girdle, abdomen, and hip joint...

By bundleHub Solution guider , Uploaded: Sep 01, 2022

$16.5

 General Science> QUESTIONS & ANSWERS > Board of Cosmetology (PSI) Written Exam Prep Questions and answers, 2022, graded A (All)

preview
Board of Cosmetology (PSI) Written Exam Prep Questions and answers, 2022, graded A

Board of Cosmetology (PSI) Written Exam Prep Questions and answers, 2022, graded A The federal agency that regulates & enforces safety & health standards in the workplace? - ✔✔OSHA if implem...

By bundleHub Solution guider , Uploaded: Aug 20, 2022

$15.5

 Management> QUESTIONS & ANSWERS > WGU D080 Managing in a Global Business Environment, Top Exam Questions and answers, rated A+ (All)

preview
WGU D080 Managing in a Global Business Environment, Top Exam Questions and answers, rated A+

WGU D080 Managing in a Global Business Environment, Top Exam Questions and answers, rated A+ The key element of globalization is interdependence and interconnectedness among companies and count...

By Topmark , Uploaded: Mar 14, 2023

$13

 Health Care> QUESTIONS & ANSWERS > HESI Version 4(2021), (A Grade), Questions and Answers, All Correct Study Guide, Download to Score A (All)

preview
HESI Version 4(2021), (A Grade), Questions and Answers, All Correct Study Guide, Download to Score A

HESI Version 4(2021), (A Grade), Questions and Answers, All Correct Study Guide, Download to Score A 1. A 26-week gestation primigravida who is carrying twins is seen in the clinic today. Her final h...

By TopScholar , Uploaded: May 14, 2021

$21

$11.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
51
0

Document information


Connected school, study & course



About the document


Uploaded On

Mar 16, 2023

Number of pages

21

Written in

Seller


seller-icon
Topmark

Member since 1 year

65 Documents Sold


Additional information

This document has been written for:

Uploaded

Mar 16, 2023

Downloads

 0

Views

 51

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$11.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·