• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
2. What is information security? What essential protections must be in place to protect information systems from danger?
the protection of information and its critical characteristics (confidentiality, integrity, and availability), including the systems and hardware that use, store, and transmit that information, through the application of policy, training and awareness programs, and technology
3. What is the importance of the C.I.A. triangle? Define each of its components.

Confidentiality- is the characteristic of information whereby only those with sufficient privileges and a demonstrated need may access it.




Integrity- is the quality or state of being whole, complete, and uncorrupted.




Availability- of information occurs when users have access to it in a usable format, without interference or obstruction.

6. Define the InfoSec processes of identification, authentication, authorization, and accountability.

Identification- is pretty much the first step/ foundation in gaining authorized access to information. This is usually done with a user name and password or another I.D


Authentication is done by the system verifying the usere is who the user claims to be. This is done by methods of cryptographic certificates to establish SSL connections as well as hardware devices.


Authorization defines what the user (whether a person or a computer) has been specifically and explicitly authorized by the proper authority to do, such as access, modify, or delete the contents of an information asset. An example of authorization is the activation and use of access control lists and authorization groups in a networking environment


Accountability occurs when a control provides assurance that every activity undertaken can be attributed to a named person or automated process. For example, audit logs that track user activity on an information system provide accountability

8. How are leadership and management similar? How are they different?

management is the process of achieving objectives by using resources.


a leader influences employees so that they are willing to accomplish objectives,


whereas a manager creates budgets, authorizes expenditures, and hires employees

10. What are the three types of general planning? Define each.

Strategic planning—This occurs at the highest levels of the organization and for a long period of time, usually five or more years.


Tactical planning—This focuses on production planning and integrates organizational resources at a level below the entire enterprise and for an intermediate duration (such as one to five years).


Operational planning—This focuses on the day-to-day operations of local resources and occurs in the present or the short term.

11. List and describe the five steps of the general problem-solving process.

• Define the Problem


• Gather Facts and Make Assumptions


• Develop Possible Solutions


• Analyze and Compare Possible Solutions


• Implement, and Evaluate

14. How can security be both a project and a process?
a continuous series or chain of projects, which comprise a process. each link in this chain of projects could be a specific project. Note that each project is to be guided by a security systems development life cycle (SecSDLC) methodology.

17. Name and very briefly describe some of the manual and automated tools that can be used to help manage projects.

The project management guide is a step-by-step guide for proper project management. The project management guide covers the basic principles, proper framework, and appropriate processes. This guide is a PowerPoint presentation that is customizable and ideal for introducing the project management process to your team. The introduction to project management workbook is a comprehensive workbook that is perfect for someone who has a requirement to be managers of projects as part of their organizational roles. The workbook serves as a crash course to project management with training materials to help you appreciate and be familiar with basic concepts of project management, to evaluate the appropriateness of a project management approach to specific activities, and to learn and implement project management methodologies. The project management methodology template outlines how to successfully manage a project through completion. The template includes descriptions for the necessary stages: project initiation, project control, and project closeout
.

18. What is a work breakdown structure (WBS) and why is it important?
A WBS is a document created on a spreadsheet to organize and manage activates within a project and allocate time and resources to certain areas in which is best cost effective.