問題一覧
1
To protect the physical items, objects, ir areas of an organization from unauthorizes access and misuse.
physical security
2
To protect the individual or group of individuals who are authorized to access the organization and its operations.
personal security
3
To protect the details of a particular operation or series of activities
operations security
4
To protect networking components, connections and contents
network security
5
A subset of communications security; the protection of voice and data networking
network security
6
Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. The protection of information and its critical elements, including the systems and hardware that use, store, and transmit the information
information security
7
The quality or state of being secure --- to be free from danger
security
8
To protect information by putting it into a special code that only some people can read, especially information that is on a computer.
encrypt
9
A subject or object's ability to use, manipulate, modify, or affect another subject or object. Authorized users have the legal access to a system. Access controls regulate this ability.
Access
10
The organizational resource that is being protected. It can be logical, such as a Web site, software information, or data; or can be physical, such as a person, computer system, hardware, or other tangible object. It particularly information of it , are the focus of what security efforts are attempting to protect.
asset
11
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
attack
12
Someone who casually reads sensitive information not intended for his or her use.
passive attack
13
A hacker attempting to break in to an information.
intentional attack
14
Ex. A lightning strike that causes a building fire .
unintentional attack
15
Perpetrated by a hacker using a PC to break into a system.
direct attack
16
A hacker compromising a system using PC and using it to attack other system.
indirect attack
17
It originate from the threat itself
direct attack
18
It originate from a compromised system or resource that is malfunctioning or working under the control of a threat
direct attacks
19
A technique used to compromise a system.
exploit
20
It can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or created by the attacker.
exploit
21
It make use of existing software tools or custom made software components.
exploit
22
A condition or state of being exposed in information security, it exists when a vulnerability is known to an attack.
exposure
23
A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use when an organization's information is stolen.
loss
24
The probability of an unwanted occurrence, such as an adverse event or loss.
risk
25
Any event or circumstance that has the potential to adversely affect operations and assets.
threat
26
The specific instance or a component of a threat
threat agent
27
An occurrence of an event caused by a threat agent.
threat event
28
A category of objects, people, or other entities that represents the origin of danger to an asset --- in other words, a category of threat agents.
threat source
29
A potential weakness in an asset or its defensive control system.
vulnerability
30
Characteristic of information that refers to how up to date information is.
timeliness
31
Characteristic of information that refers to an attribute of information that describes how data is genuine or original rather than reproduced or fabricated.
authenticity
32
Characteristic of information that refers to an attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.
availability
33
Characteristic of information that refers to an attribute that describes how data is protected from disclosure or exposure to unauthorized individuals or obstruction.
confidentiality
34
Characteristic of information that refers to an attribute of information that describes how data is whole, complete and uncorrupted.
integrity
35
Characteristic of information that refers to an attribute of information that describes how the data's ownership or control is legitimate or authorized.
possession
36
Characteristic of information that refers to how data value or usefulness for an end purpose.
utility
37
Characteristic of information that is free from mistakes or errors and has the value that the end user expects.
accuracy
38
Component of information system that includes applications(programs) , OS, and assorted command utilities. Most difficult to secure.
software
39
Component of information system that refers to the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system
hardware
40
Component of information system that refers to what is stored, processed, and transmitted by a computer system must be protected. Often the most valuable asset of an organisation and therefore is the main target of intentional attacks.
data
41
The weakiest link in an organisation's information security program.
people
42
Component of information system that refers to the written instructions for accomplishing a specific task.
procedures
43
Component of information system that created much of the need for increased computer and information security. When information systems are connected to each otherto form LANS
networks
44
The protection of information and its critical elements including systems and hardware that use , store, and transmit that information.
information security
45
The entire set of controls and safeguards, includ- ing policy, education, training and awareness, and technology, that the organization implements to protect the asset.
protection profile or security posture
46
The industry standard for computer security; confidentiality, integrity, and availability.
C.I. A Triad/ C.I.A Triangle
47
graphical representation of the architectural approach widely used in computer and information security; commonly shown as a cube composed of 3x3x3 cells, similarto a Rubik's Cube.
Mc Cumber Cube
48
A methodology of establishing security policies and/or practices that is initiated by upper management.
top-down approach
49
A method of establishing security policies and/or practices that begins as agrassroots effort in which systems administrators attempt to improve the security of their systems.
bottom-up approach
50
A methodology for the design and implementation of an information system.
SDLC
51
A formal approach to solving a problem based on a structured sequence of procedures.
methodology
52
A type of SDLC in which each phase of the process "flows from" the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.
waterfall model
53
A methodological approach to the development of software that seeks to build security into the development life cycle rather than address it at later stages. It attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that users can deploy with confidence
software assurance (SA)
54
When computer is used as an active tool to conduct attack
subject
55
When computer is the entity being attacked.
object
56
It is impossible to obtain perfect security
true
57
It is a process, not an absolute
true
58
Security between protection and availability should not be balanced
false
59
To achieve balance, level of security must allow reasonable access
true
60
The logical models are converted into Physical models and may include network maps and description of servers and other devices to be used in the system.
physical design
61
The team assessess the feasibility of the proposed project and selects a development methodology.
investigation
62
The team determines the user requirementfor the new system and develops logical models of the system
analysis
63
The logical models developed during the second step are revised the ensure that the ew system will meet the user requirements identified in the first step.
logical design
64
Continuously monitor the software for security risks.
maintenance
65
Responsible for the security and use of a particular set of information.
data ownership
66
Responsible for storage, maintenance, and protection.
data custodian
67
End users who work with information and to protect their daily jobs supporting the mission of the organization.
data users
68
A type of information security threat that uses social engineering to trick users into giving up confidential information
Phishing
69
Malicious software that can steal information, delete files, deny access to data, or replicate itself.
malware
70
A cyber security threat where an attacker holds a victim's computer system and data hostage, demanding payment before restoring access.
ransomware
71
An object, person, or other entity that represents a constant danger to an asset
threats
72
The ownership of ideas and control over the tangible or virtual representation of those idea.
intellectual property
73
Attacks occur when an individual or group designs and deoloys software to attack a system.
deliberate software attacks
74
Are software program that hide their true nature and reveal their designed behaviour only when activated
trojan horses
75
Consists of segments of code that perform malicious actions.
virus
76
It allows the attacker to access the system bat will with special privileges.
backdoor or trap door
77
Is one that overtime changes the way ir appears to antivirus software programs making it undetectable by techniques that look for the pre-configured signatures.
polymorphic threats
78
Situations where products or services are not delivered as expected.
deviations in quality of service by service providers
79
A well known and briad category of electronic and human activities that can breach the confidentiality of information when unauthorized individual gains access to the information.
espionage or trespass
80
Occurs with very little warning and are beyond control of people.
forces of nature
81
Acts done with no malicious intent
human error or failure
82
Occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.
information extortion
83
Destroy an asset or damage the image of an organization.
sabotage or vandalism
84
Illegal taking of anothera proerty. Copied withou the owners content.
theft
85
Occur when a manufacturer distributes equipment containing a known or unknown flaw.
technical harware failures or errors
86
Outdated infrastructure can lead to unreliable and untrustworthy systems.
technological obsolescene
87
Take advantage of a vulnerability to compromise a controlled system.
attacks