Section 2 Lesson 4 Information Security Flashcards

(25 cards)

1
Q

What is confidentiality in information security?

A

Prevents unauthorized access to sensitive data by ensuring that only authorized individuals can view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is integrity in information security?

A

Maintains data accuracy and reliability by preventing unauthorized modification, deletion, or corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is availability in information security?

A

Ensures that data and resources are accessible when needed by authorized users, minimizing disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is information security?

A

The practice of protecting digital information from unauthorized access, modification, and disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is authentication in information security?

A

The process of verifying the identity of a user or entity before granting access to a system or resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is access control in information security?

A

A security measure that determines who is allowed to access specific data, systems, or resources within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data analysis?

A

Looking at large amounts of information to identify common patterns and notice when something is different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hot site?

A

A fully operational backup facility equipped with all necessary hardware, software, and data to quickly resume operations in case of a disaster. Most expensive but offers the fastest recovery time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a warm site?

A

A backup facility partially equipped with hardware and software, requiring additional setup before becoming fully operational. Less expensive than a hot site but faster recovery than a cold site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cold site?

A

A backup facility that provides only physical space and basic infrastructure for data recovery. Lacks hardware, software, and data, making it the least expensive but with the longest recovery time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assets

A

Resources within an organization (data, systems, devices) that need protection from security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Controls

A

Security measures or policies designed to protect assets by preventing, detecting, or responding to threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats

A

Potential dangers that could exploit weaknesses in a system, leading to unauthorized access, data breaches, or system disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerabilities

A

Weaknesses or flaws in a system, process, or security control that could be exploited by threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FERPA (Family Educational Rights and Privacy Act)

A

U.S. law that safeguards student education records and grants access rights to parents and eligible students.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FISMA (Federal Information Security Modernization Act)

A

U.S. law requiring federal agencies to implement security programs to protect government information and systems.

17
Q

GRC (Governance, Regulation, and Compliance)

A

Framework organizations use to align security policies with legal and industry requirements while managing risks effectively.

18
Q

GDPR (General Data Protection Regulation)

A

EU law regulating how organizations collect, store, and process personal data to protect individual privacy.

19
Q

HIPAA (Health Insurance Portability and Accountability Act)

A

U.S. law establishing standards for protecting sensitive patient health information from unauthorized access.

20
Q

PCI DSS (Payment Card Industry Data Security Standard)

A

Security standard for organizations handling credit card transactions to protect payment data from fraud and breaches.

21
Q

SOX (Sarbanes–Oxley Act)

A

U.S. law enforcing financial reporting and accountability measures to prevent corporate fraud and protect investors.

22
Q

Malware

A

Malicious software like viruses and ransomware that infect systems and steal or encrypt data.

23
Q

Phishing

A

Attacks that trick users into revealing sensitive information through deceptive emails or websites.

24
Q

Denial-of-Service (DoS)

A

Flooding systems with traffic to make them unavailable to legitimate users.

25
Insider Threats
Security risks from within an organization, where employees or contractors may intentionally or accidentally compromise security.