Information Security Test
Enter the letter for the matching Definition
| A. _____ is when an organization must be able to demonstrate that the employee agreed to comply with the policy through act or affirmation. Common techniques include logon banners or signed document indicating agreement to comply with policy.B. An attempt on a system or other information asset by using it illegally for their personal gain or a documented process to take advantage of a vulnerability or exposure, usually in softwareC. _____ provides guidance on the use of encryption and provides protection from government intervention.
D. _____ is one of the most common methods of obtaining inside and classified information is directly or indirectly from an individual, usually an employee.E. ____ is the act of sending an e-mail message with a modified field and is a problem for many people today because often the modified field is the address of the originatorF. To protect American ingenuity, intellectual property, and competitive advantage, Congress passed the _____. This law attempts to prevent trade secrets from being illegally shared.G. An approach to software development that includes planning for security objectives in the systems development lifecyle used to create systems with procedures and software deployed in a secure fashion is called _____.H. _____ enables authorized users—persons or computer systems—to access information without interference or obstruction and to receive it in the required formatI. Commonplace security principle that says:
where feasible a protection mechanism should require two keys to unlock, rather than oneJ. _____ was one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices.K. The Federal Trade Commission (FTC) describes _____ is “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.”L. To perform effectively, organizations must employ secure infrastructure services appropriate to the _____ of the enterprise.M. _____ affects the executive management of publicly traded corporations and public accounting firms. This law seeks to improve the reliability and accuracy of financial reporting.N. A weaknesses or fault in a system or protection mechanism that opens it to attack or damage.O. Commonplace security principle that says:
Keep the design as simple and small as possibleP. A ____ is an automated software program that executes certain commands when it receives a specific input.Q. Commonplace security principle that says:
the design should not be secret but rather dependent on the possession of keys or passwordsR. Information security performs four important functions for an organization. They are:S. During the _____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design. This phase integrates various components and technologies. T. In the _____ phase, the information gained from the analysis phase is used to begin creating a systems solution for a business problem. |
Type the Term that corresponds to the displayed Definition.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
kimberjingle
Popular Computers sets