Information Assurance and Security Fundamentals

CrisperEuropium avatar
CrisperEuropium
·
·
Download

Start Quiz

Study Flashcards

12 Questions

Information Assurance and Security ensures ______ of data assets.

confidentiality

Key components of Information Assurance and Security include encryption, access control, intrusion detection, and ______ response.

incident

In the 1960s-1970s, information security primarily focused on physical security measures for mainframe computers and ______ centers.

data

The 1980s saw the advent of personal computing and early networking technologies, spurring interest in securing communication channels and protecting data from unauthorized ______.

access

Encryption techniques started to gain traction in the 1980s to protect data from unauthorized ______.

access

In the 1990s, concerns about identity theft, phishing, and cyberattacks grew as ______ communication became mainstream.

digital

In the 2000s, Information Assurance and Security became a critical priority as cyber threats became more sophisticated, prompting increased investment in ______ measures.

cybersecurity

The proliferation of mobile devices, cloud computing, and Internet of Things (IoT) further expanded the attack surface, requiring comprehensive ______ strategies.

security

Edward Snowden, a former CIA employee, copied and leaked classified information from the National Security Agency (NSA), highlighting the fact that the government was effectively ‘spying’ on the public. Snowden is controversially thought of as a hero to some, and a ______ to others.

traitor

Hackers broke into Yahoo in 2013-2014, jeopardizing accounts and personal information of all their three billion users. Yahoo was fined $35 million for failing to disclose news of the breach in a timely manner, and its sale price decreased by $350 million as a result of the ______.

breach

WannaCry, in 2017, targeted computers running the Microsoft Windows operating system and demanded ransom payments in the Bitcoin cryptocurrency. In only one day, the worm infected over 230,000 computers across 150 countries. WannaCry is widely known as the first ‘______’.

ransomworm

Information Assurance and Security continue to evolve rapidly as technology advances and cyber threats become increasingly complex. Artificial intelligence, machine learning, and automation are being leveraged for threat detection and response, while organizations strive to stay ahead of emerging risks and ______ requirements.

compliance

Learn about the processes, technologies, and practices to safeguard digital information and systems, ensuring confidentiality, integrity, and availability of data assets. Explore key components like encryption, access control, intrusion detection, and incident response.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser