Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Goals of Information Security can be expressed as CIA. What does CIA stand for? |
|
|
Methods of ensuring Confidentiality |
|
|
What is Due Care, and Due Diligence |
|
|
Identification is happens before? |
Authentication and is the process of having users identify themselves to the system. |
|
The step after the user inputs the identifying information for the account is? |
Authentication which where the identifying information is verified
|
|
The step after Authentication is? |
Authorization is being given access examples: Permissions, Router ACLs, Proxy servers, Facility access. |
|
The difference between Due Care and Due diligence. |
Due care is the performance of actions that ensure the security and are the result of Due diligence. Note: Audits and log files are part of Due diligence. |
|
Digital signature are created with the? |
Sender's private key and verified with the sender's mathematically related public key. |
|
The Private Key pair within a digital certificate can be used to ___________ and _____________ sensitive files. |
Encrypt and Decrypt |
|
Digital certificates can also be used to __________ a computer to a _____________ ___________ or ____________ , such as a VPN server. |
Authenticate, secure server, appliance |
|
Methods of ensuring Data Integrity. |
|
|
Methods of ensuring Availability. |
|
|
What is Accountability? |
Ensuring that employees are accountable for their actions. |
|
What are four methods of implementing accountability? |
|
|
What is Authorization? |
Configuring what assets the person can access after they have identified themselves to the system and have been authenticated. |
|
Three steps involved in network access are? |
|
|
What is the difference between the Owner and the Custodian? |
|