Information Assurance and Security Quiz
13 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Information Assurance (IA) is the study of how to protect your information assets from ______, ______, ______, and ______. But also, how to ______ should any of those happen.

Information Assurance (IA) is the study of how to protect your information assets from ______, ______, ______, and ______. But also, how to ______ should any of those happen.

Information Assurance (IA) is the study of how to protect your information assets from ______, ______, ______, and ______. But also, how to ______ should any of those happen.

destruction, degradation, manipulation, exploitation, recover

IA ensures timely, reliable access to data and information services for ______ users.

<p>authorized</p> Signup and view all the answers

IA protects against unauthorized ______ or ______ of information.

<p>modification, destruction</p> Signup and view all the answers

IA provides assurance that information is not disclosed to ______ persons.

<p>unauthorized</p> Signup and view all the answers

IA uses security measures to establish the ______ of a transmission, message, or originator.

<p>validity</p> Signup and view all the answers

IA provides ______ that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity.

<p>non-repudiation</p> Signup and view all the answers

What is the general concern for all individuals and decision makers in today's world?

<p>Cybersecurity</p> Signup and view all the answers

What are some reasons why states may conduct cyberattacks?

<p>Industrial espionage, economic damage, inflict real damage as an act of war</p> Signup and view all the answers

Who are the potential perpetrators of cyberattacks?

<p>Criminals and states</p> Signup and view all the answers

What are the two types of measures that societies must take to protect against cybersecurity attacks?

<p>Preventive and reactive measures</p> Signup and view all the answers

What is vulnerable to cyberattacks?

<p>States and their interconnected critical infrastructures</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser