When should security requirements be addressed in systems development?
From the very beginning
Which term is often associated with the precision of data?
Integrity
What is the primary method of enforcing security concepts?
Through the use of controls
A security concept that protects against repudiation threats?
Accountability
A security concept that addresses the logging of transactions so that at a later time a history of transactions can be built, if needed.
Auditing
A security concept that verifies and validates identity information that is supplied.
Authentication
A security concept that has to do with the checking of a subject’s rights and privileges before granting access to the objects that the subject requests.
Authorization
A security concept that assures protection against destruction of the data or system or denial of service. It addresses the accessibility of the software and/or the data it handles. - Availability - Confidentiality - Accountability - Authorization
Availability
A security concept that assures the protection of data against unauthorized disclosure. It ensures the secrecy and privacy of data.
Confidentiality
The act of permanently and completely removing personal identifiers from data, such as converting personally identifiable information (PII) into aggregated data.
Data anonymization
A security concept that addresses the deniability of actions taken by the software or the user. It ensures that the actions taken by the software on behalf of the user (intentionally or unintentionally) cannot be refuted or denied.
Non-repudiation
The secure disposal of software and the data the software processes, transmits, and stores.
Disposition
A security concept that assures protection against unauthorized alterations (or modifications).
Integrity
Which type of control will proactively stop a threat from successfully attacking a system?
Preventative
In addition to restricting a user to the minimum level of access they require to perform their job, least privilege may also restrict access based on which factor?
Time
Which term is often used to define a security requirement?
Availability
What is the result of encrypting a hash of a message with the private key of the sender?
Digital signature
What is the secruity control used when displaying an asterix as a user enters a password?
Masking
What is the core security concept addressed through “need to know”?
Confidentiality
What security concept provides trust in a cryptographic algorithm?
Open design
When is the best time to involve security into systems development?
As early as possible in the project lifecycle
Which of the following statements about the availability concept of Information security management is true?
Ensures reliable and timely access to resources
The concept of preventing a subject from denying a previous action with an object in a system is a description of?
Non-repudiation
The CIA of security includes:
Confidentiality, integrity, availability