記憶度
7問
20問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It is the quality or state of being secure-to be free from danger.
Security
2
layers of security that protect physical items, objects, or areas from unauthorized access and misuse.
Physical Security
3
To protect the individual or group of individuals who are authorized to access the organization and its operations
Personnel Security
4
To protect the details of a particular operation or series of activities
Operations Security
5
to protect communications media, technology, and content
Communications Security
6
to protect networking components, connections, and contents
Network Security
7
to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission.
Information Security
8
Meaning of CNSS
Committee on National Security Systems
9
Provides a graphical representation of the architectural approach widely used in computer and information security, it is known as the _______.
McCumber Cube
10
It is much more than computer hardware; it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information resources in the organization.
Information System
11
A component of the IS comprises applications, operating systems, and assorted command utilities. ______ is perhaps the most difficult IS component to secure.
Software
12
The physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system.
Hardware
13
Data stored, processed, and transmitted by a computer system must be protected. ______ is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
Data
14
Though often overlooked in computer security considerations, _____ have always been a threat to information security. ______ can be the weakest link in an organization’s information security program.
People
15
_______ are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization’s procedures, this poses a threat to the integrity of the information.
Procedures
16
The IS component that created much of the need for increased computer and information security is networking. When information systems are connected to each other to form local area networks (LANs), and these LANs are connected to other networks such as the Internet, new security challenges rapidly emerge.
Networks
17
SDLC range from having phases?
3 to 12
18
It illustrates that each phase begins with the results and information gained from the previous stage.
Waterfall model
19
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems. This is often referred to as a _______.
bottom-up approach
20
The _____________ —in which the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action—has a higher probability of success.
top-down approach
21
The first phase, _________, is the most important. What problem is the system being developed to solve? The _______ phase begins with an examination of the event or plan that initiates the process.
investigation
22
begins with the information gained during the investigation phase. This phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Analysis
23
the information gained from the analysis phase is used to begin creating a systems solution for a business problem. In any systems solution, it is imperative that the first and driving factor is the business need.
Logical Design
24
specific technologies are selected to support the alternatives identified and evaluated in the logical design. The selected components are evaluated based on a make-or-buy decision (develop the components in-house or purchase them from a vendor).
physical design
25
any needed software is created. Components are ordered, received, and tested. Afterward, users are trained and supporting documentation created.
Implementation
26
The _________is the longest and most expensive phase of the process. This phase consists of the tasks necessary to support and modify the system for the remainder of its useful life cycle.
maintenance and change
27
It is an object, person, or other entity that presents an ongoing danger to an asset.
threat
28
It is an act that takes advantage of a vulnerability to compromise a controlled system.
Attack
29
It is an identified weakness in a controlled system, where controls are not present or are no longer effective.
vulnerability
30
It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
malicious code
31
A more devious attack on computer systems is the transmission of a virus hoax with a real virus attached.
Hoaxes
32
Using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource through a back door
Back Doors
33
Attempting to reverse-calculate a password is often called cracking. A cracking attack is a component of many dictionary attacks (to be covered shortly). It is used when a copy of the Security Account Manager (SAM) data file, which contains hashed representation of the user’s password, can be obtained.
Password Crack
34
The application of computing and network resources to try every possible password combination is called a ________attack. Since the ______attack is often used to obtain passwords to commonly used accounts, it is sometimes called a password attack.
Brute Force
35
The ______is a variation of the brute force attack which narrows the field by selecting specific target accounts and using a list of commonly used passwords (the dictionary) instead of random combinations.
Dictionary
36
In a ________ attack, the attacker sends a large number of connection or information requests to a target. So many requests are made that the target system becomes overloaded and cannot respond to legitimate requests for service. The system may crash or simply become unable to perform ordinary functions.
denial-of-service (DoS)
37
A _________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. Most DDoS attacks are preceded by a preparation phase in which many systems, perhaps thousands, are compromised.
distributed denial-of-service (DDoS)
38
In the well-known _______ or TCP hijacking attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. This type of attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
man-in-the-middle
39
______ is unsolicited commercial e-mail. While many consider spam a trivial nuisance rather than an attack, it has been used as a means of enhancing malicious code attacks.
Spam
40
Another form of e-mail attack that is also a DoS is called a_____, in which an attacker routes large quantities of e-mail to the target.
mail bomb
41
A ______ is a program or device that can monitor data traveling over a network. _______ can be used both for legitimate network management functions and for stealing information.
Sniffer
42
It is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
social engineering
43
It is an attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity. ______ attacks use three primary techniques, often in combination with one another: URL manipulation, Web site forgery, and phone phishing.
Phishing
44
_______ is “the redirection of legitimate Web traffic (e.g., browser requests) to an illegitimate site for the purpose of obtaining private information. _______ often uses Trojans, worms, or other virus technologies to attack the Internet browser’s address bar so that the valid URL typed by the user is modified to that of the illegitimate Web site.
Pharming
45
A _______explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system.
timing attack
46
: Keep the design as simple and small as possible.
Economy of mechanism
47
: Base access decisions on permission rather than exclusion.
Fail-safe defaults
48
: Every access to every object must be checked for authority.
Complete mediation
49
: The design should not be secret, but rather depend on the possession of keys or passwords.
Open design
50
: Where feasible, a protection mechanism should require two keys to unlock, rather than one.
Separation of privilege
51
: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.
Least privilege