logo image

Information Security Chapter 1

A breach of possession always results in a breach of confidentiality.
False
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Physical
Which of the following is a valid type of data ownership?
Data Users, Data Owners and Data Custodians
____ is the predecessor to the Internet.
Arpanet
A(n) ____ attack is a hacker using a personal computer to break into a system.
Direct
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
Confidentiality
The ____ model consists of six general phases.
Waterfall
Key end users should be assigned to a developmental team, known as the united application development team.
False
A(n) _________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
Community of Interest
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.
True
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
True
The physical design is the blueprint for the desired solution.
False
The ____________________ of information is the quality or state of ownership or control of some object or item.
Possession
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.
Network
The history of information security begins with the history of ____________________ security.
Computer
MULTICS stands for Multiple Information and Computing Service.
False
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Cold
Recently, many states have implemented legislation making certain computer-related activities illegal.
True
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, which is often referred to as a bottom-up approach.
True
A famous study entitled “Protection Analysis: Final Report” was published in ____.
1978
Risk evaluation is the process of identifying, assessing, and evaluating the levels of risk facing the organization, specifically the threats to the organization’s security and to the information stored and processed by the organization.
False
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
False
Of the two approaches to information security implementation, the top-down approach has a higher probability of success.
True
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.
NSTISSI No. 4011
An e-mail virus involves sending an e-mail message with a modified field.
False
Organizations are moving toward more ____-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.
Security
____ of information is the quality or state of being genuine or original.
Authenticity
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Top-Down
Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system.
True
The ____________________ component of the IS comprises applications, operating systems, and assorted command utilities.
Software
People with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.
System Administrator
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.
False
The most successful kind of top-down approach involves a formal development strategy referred to as a ____.
Systems Development life cycle
____ was the first operating system to integrate security as its core functions.
MULTICS
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
False
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Physical
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what steps are taken when an attack occurs.
Incidence Response
A frequently overlooked component of an IS, ____________________ are written instructions for accomplishing a specific task.
Procedures
The investigation phase of the SecSDLC begins with a directive from upper management.
True
Policies are written instructions for accomplishing a specific task.
False
____________________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format.
Availability
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
CISO
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Analysis
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
Authenticity
A computer is the ____________________ of an attack when it is the target entity.
Object
The possession of information is the quality or state of having value for some purpose or end.
False
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.
Hash
During the ____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design.
Physical Design
Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat.
False
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.
CIA
The roles of information security professionals are aligned with the goals and mission of the information security community of interest.
True
Using a methodology increases the probability of success.
True
Confidentiality ensures that only those with the rights and privileges to access information are able to do so.
True
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.
Hardware, Software, Data
The senior technology officer is typically the chief ____________________ officer.
Information
A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Methodology
A(n) ____________________ information security policy outlines the implementation of a security program within the organization.
Enterprise
Which of the following phases is the longest and most expensive phase of the systems development life cycle?
Maintenance and Change
In general, protection is “the quality or state of being secure—to be free from danger.”
False
____________________ carries the lifeblood of information through an organization.
Software
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.
True
A champion is a project manager, who may be a departmental line manager or staff unit manager, and understands project management, personnel management, and information security technical requirements.
False
The Analysis phase of the SecSDLC begins with a directive from upper management.
False
A computer is the ____ of an attack when it is used to conduct the attack.
Subject
Information security can be an absolute.
False
The ____ is a methodology for the design and implementation of an information system in an organization.
SDLC
Network security focuses on the protection of the details of a particular operation or series of activities.
False
Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.
False
The value of information comes from the characteristics it possesses.
True
Information has ____________________ when it is whole, complete, and uncorrupted.
Integrity
The bottom-up approach to information security has a higher probability of success than the top-down approach.
False
When a computer is the subject of an attack, it is the entity being attacked.
False
In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more would be noticed — but eventually the employee gets something complete or useable.
True
The Security Development Life Cycle (SDLC) is a methodology for the design and implementation of an information system.
False
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas.
True

Need essay sample on "Information Security Chapter 1"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy