12 Questions
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______
ACCESS
The organizational resource that is being protected.- ______
ASSET
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______
ATTACK
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______
CONTROL, SAFEGUARD, COUNTERMEASURE
Technique used to compromise a system.- ______
EXPLOIT
A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______
VULNERABILITY
Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.
hands
IT SECURITY - is information security applied to ______ (most often some form of computer system).
technology
INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.
issues
Information security entails a sense of assurance that information risks and controls are ______.
balanced
HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.
mainframes
ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.
communication
Test your knowledge of information security terminologies with this quiz. Identify and understand key terms related to access, asset, attack, control, and safeguard in the context of organizational security measures.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free