• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Information security have 4 functions

Protecting the organization's ability to función .


Protecting the data and information the organization collects and uses.


Enabling the safe operation of applications running on the organization's IT systems.


Safeguarding the organization technology assets

Protecting the functionality of an organization

Implementing information security has more to do with management than technology.


Management it is responsible for facilitating security programs.


Communities of interest should adress information security in terms of business impact and cost of business interruption.. business desastre recovery

Protecting the data that organizations collect and use

Without data, an organization loses its record of tansactiond and ability to deliver value to customers.


Protecting data in transmission, in processing, and at rest (storage) is a crítica aspect of Information security.


Enabling the safe operation of applications

Organizations needs environment that safeguard applications using IT systems.


Management must continue to oversees infrastructure once in place- not relegate to it department

Safeguarding technology assets in organizations

Organizations must employ secure infrastructure hardware appropriate to the size and scope of the enterprise.


Additional security services may be needed as the organization grows.


Last resource ... replace security programs the organization has outgrown

Compromise to intellectual property

Piracy, copyright

Category of threat

Deviation. In quality of services

Internet services provided (ISP), power, Orr WAN services problems

Category of threat

Espionage or traspasa

Unauthorized access and/or data collection

Category of threat

Forces of nature

Fire, floods, earthquakes , lightning

Category of threat

Human error or failure

Accidents, employee mistakes

Category of threat

Information extortion

Blackmail, information disclosure

Category of threat

Sabotage or vandalism

Destruction of systems of information

Category of threat

Software attacks

Viruses, worms,macros, denial-of-services

Category of threat

Technical hardware failures or errors

Equipment failure

Category threat

Technical software failure or error

Bugs, code problems, unknown loopholes

Category threat

Technological obsolescence

Antiquated or outdated technology

Category threat

Theft

Illegal confiscation of equipment or information

Category of threat

Intellectual property (IP)

Creation, ownership, and control of original ideas as well as the representation of those ideas

SIIA

Software and information industry association

BSA

Business software alliance

Organizations that investigate softwares abuse