Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
- 3rd side (hint)
Information security have 4 functions |
Protecting the organization's ability to función . Protecting the data and information the organization collects and uses. Enabling the safe operation of applications running on the organization's IT systems. Safeguarding the organization technology assets |
|
|
Protecting the functionality of an organization |
Implementing information security has more to do with management than technology. Management it is responsible for facilitating security programs. Communities of interest should adress information security in terms of business impact and cost of business interruption.. business desastre recovery |
|
|
Protecting the data that organizations collect and use |
Without data, an organization loses its record of tansactiond and ability to deliver value to customers. Protecting data in transmission, in processing, and at rest (storage) is a crítica aspect of Information security. |
|
|
Enabling the safe operation of applications |
Organizations needs environment that safeguard applications using IT systems. Management must continue to oversees infrastructure once in place- not relegate to it department |
|
|
Safeguarding technology assets in organizations |
Organizations must employ secure infrastructure hardware appropriate to the size and scope of the enterprise. Additional security services may be needed as the organization grows. Last resource ... replace security programs the organization has outgrown |
|
|
Compromise to intellectual property |
Piracy, copyright |
Category of threat |
|
Deviation. In quality of services |
Internet services provided (ISP), power, Orr WAN services problems |
Category of threat |
|
Espionage or traspasa |
Unauthorized access and/or data collection |
Category of threat |
|
Forces of nature |
Fire, floods, earthquakes , lightning |
Category of threat |
|
Human error or failure |
Accidents, employee mistakes |
Category of threat |
|
Information extortion |
Blackmail, information disclosure |
Category of threat |
|
Sabotage or vandalism |
Destruction of systems of information |
Category of threat |
|
Software attacks |
Viruses, worms,macros, denial-of-services |
Category of threat |
|
Technical hardware failures or errors |
Equipment failure |
Category threat |
|
Technical software failure or error |
Bugs, code problems, unknown loopholes |
Category threat |
|
Technological obsolescence |
Antiquated or outdated technology |
Category threat |
|
Theft |
Illegal confiscation of equipment or information |
Category of threat |
|
Intellectual property (IP) |
Creation, ownership, and control of original ideas as well as the representation of those ideas |
|
|
SIIA |
Software and information industry association |
|
|
BSA |
Business software alliance |
Organizations that investigate softwares abuse |