Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

4 Cards in this Set

  • Front
  • Back
Reliable systems satisfy five principles
-Information Security (discussed in Chapter 7)
-Processing integrity
Maintaining confidentiality requires that management identify which information is sensitive.
Each organization will develop its own definitions of what information needs to be protected.
Most definitions will include:
Business plans
Pricing strategies
Client and customer lists
Legal documents
Controls to Protect Confidentiality
Storage: Encryption and access controls
Transmission: Encryption
Disposal: Shredding, thorough erasure, physical destruction
Overall: Categorization to reflect value and training in proper work practices
Fundamental control procedure.
Solves the interception issue.
If encrypted before sending it is a VPN, virtual private network