問題一覧
1
A methodology of establishing security policies and/or practices that is initiated by upper management.
top-down approach
2
Any event or circumstance that has the potential to adversely affect operations and assets.
threat
3
The object, person, or other entity that represents a constant danger to an assets
threats
4
The quality or state of being secure --- to be free from danger
security
5
Characteristic of information that refers to how up to date information is.
timeliness
6
The logical models developed during the second step are revised the ensure that the ew system will meet the user requirements identified in the first step.
logical design
7
Attacks occur when an individual or group designs and deoloys software to attack a system.
deliberate software attacks
8
An object, person, or other entity that represents a constant danger to an asset
threats
9
Continuously monitor the software for security risks.
maintenance
10
It can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or created by the attacker.
exploit
11
Attack includes the execution of viruses, worms, trojans horses, and active web scriptswith the intent yo destroy or steal information
malicious code
12
A condition or state of being exposed in information security, it exists when a vulnerability is known to an attack.
exposure
13
The team assessess the feasibility of the proposed project and selects a development methodology.
investigation
14
A type of SDLC in which each phase of the process "flows from" the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.
waterfall model
15
The specific instance or a component of a threat
threat agent
16
A technique used to compromise a system.
exploit
17
Responsible for storage, maintenance, and protection.
data custodian
18
Hacks the public telephone network
phreaker
19
The entire set of controls and safeguards, includ- ing policy, education, training and awareness, and technology, that the organization implements to protect the asset.
protection profile or security posture
20
Component of information system that refers to the written instructions for accomplishing a specific task.
procedures
21
It exists when a vulnerability is known to an attack.
exposure
22
Malicious software that can steal information, delete files, deny access to data, or replicate itself.
malware
23
It originate from a compromised system or resource that is malfunctioning or working under the control of a threat
direct attacks
24
Using social skills to convince people to reveal access credentials or other valuable info to the attacker.
social engineering
25
End users who work with information and to protect their daily jobs supporting the mission of the organization.
data users
26
A hacker that develops software scripts and codes. Usually a master of many skills. Often create attack software and share with others.
expert
27
A subject or object's ability to use, manipulate, modify, or affect another subject or object. Authorized users have the legal access to a system. Access controls regulate this ability.
Access
28
Occur when a manufacturer distributes equipment containing a known or unknown flaw.
technical harware failures or errors
29
Component of information system that created much of the need for increased computer and information security. When information systems are connected to each otherto form LANS
networks
30
Characteristic of information that refers to an attribute of information that describes how the data's ownership or control is legitimate or authorized.
possession
31
When computer is used as an active tool to conduct attack
subject
32
Characteristic of information that refers to an attribute of information that describes how data is whole, complete and uncorrupted.
integrity
33
A hacker attempting to break in to an information.
intentional attack
34
Illegal taking of anothera proerty. Copied withou the owners content.
theft
35
The weakiest link in an organisation's information security program.
people
36
A well known and briad category of electronic and human activities that can breach the confidentiality of information when unauthorized individual gains access to the information.
espionage or trespass
37
A method of establishing security policies and/or practices that begins as agrassroots effort in which systems administrators attempt to improve the security of their systems.
bottom-up approach
38
A hacker compromising a system using PC and using it to attack other system.
indirect attack
39
Characteristic of information that refers to an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.
availability
40
A methodological approach to the development of software that seeks to build security into the development life cycle rather than address it at later stages. It attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that users can deploy with confidence
software assurance (SA)
41
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
attack
42
The team determines the user requirementfor the new system and develops logical models of the system
analysis
43
To protect information by putting it into a special code that only some people can read, especially information that is on a computer.
encrypt
44
To protect networking components, connections and contents
network security
45
The probability of an unwanted occurrence, such as an adverse event or loss.
risk
46
Characteristic of information that refers to how data value or usefulness for an end purpose.
utility
47
A type of information security threat that uses social engineering to trick users into giving up confidential information
Phishing
48
Characteristic of information that refers to an attribute that describes how data is protected from disclosure or exposure to unauthorized individuals or obstruction.
confidentiality
49
A subset of communications security; the protection of voice and data networking
network security
50
Component of information system that includes applications(programs) , OS, and assorted command utilities. Most difficult to secure.
software
51
A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use when an organization's information is stolen.
loss
52
When computer is the entity being attacked.
object
53
Component of information system that refers to the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system
hardware
54
Is one that overtime changes the way ir appears to antivirus software programs making it undetectable by techniques that look for the pre-configured signatures.
polymorphic threats
55
To protect the individual or group of individuals who are authorized to access the organization and its operations.
personal security
56
Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. The protection of information and its critical elements, including the systems and hardware that use, store, and transmit the information
information security
57
A potential weakness in an asset or its defensive control system.
vulnerability
58
A cyber security threat where an attacker holds a victim's computer system and data hostage, demanding payment before restoring access.
ransomware
59
The ownership of ideas and control over the tangible or virtual representation of those idea.
intellectual property
60
A formal approach to solving a problem based on a structured sequence of procedures.
methodology
61
Someone who casually reads sensitive information not intended for his or her use.
passive attack
62
Perpetrated by a hacker using a PC to break into a system.
direct attack
63
An individual who cracks or removes protected design to prevent unauthorized duplication
cracker
64
Consists of segments of code that perform malicious actions.
virus
65
It make use of existing software tools or custom made software components.
exploit
66
Outdated infrastructure can lead to unreliable and untrustworthy systems.
technological obsolescene
67
The logical models are converted into Physical models and may include network maps and description of servers and other devices to be used in the system.
physical design
68
An occurrence of an event caused by a threat agent.
threat event
69
Occurs with very little warning and are beyond control of people.
forces of nature
70
graphical representation of the architectural approach widely used in computer and information security; commonly shown as a cube composed of 3x3x3 cells, similarto a Rubik's Cube.
Mc Cumber Cube
71
It allows the attacker to access the system bat will with special privileges.
backdoor or trap door
72
Hackers of limited skills. Use expert written software to exploit a system. Do not usually fully understand the systems they hack.
script kiddies
73
The organizational resource that is being protected. It can be logical, such as a Web site, software information, or data; or can be physical, such as a person, computer system, hardware, or other tangible object. It particularly information of it , are the focus of what security efforts are attempting to protect.
asset
74
Ex. A lightning strike that causes a building fire .
unintentional attack
75
A category of objects, people, or other entities that represents the origin of danger to an asset --- in other words, a category of threat agents.
threat source
76
Situations where products or services are not delivered as expected.
deviations in quality of service by service providers
77
To achieve balance, level of security must allow reasonable access
true
78
It is impossible to obtain perfect security
true
79
Occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.
information extortion
80
Security between protection and availability should not be balanced
false
81
To protect the details of a particular operation or series of activities
operations security
82
Are software program that hide their true nature and reveal their designed behaviour only when activated
trojan horses
83
To protect the physical items, objects, ir areas of an organization from unauthorizes access and misuse.
physical security
84
Acts done with no malicious intent
human error or failure
85
Component of information system that refers to what is stored, processed, and transmitted by a computer system must be protected. Often the most valuable asset of an organisation and therefore is the main target of intentional attacks.
data
86
Explores the contents of a web browser's cache and store
timing attack
87
The industry standard for computer security; confidentiality, integrity, and availability.
C.I. A Triad/ C.I.A Triangle