Information Security Terminologies Quiz

EasygoingGeometry avatar
EasygoingGeometry
·
·
Download

Start Quiz

Study Flashcards

12 Questions

A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______

ACCESS

The organizational resource that is being protected.- ______

ASSET

An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______

ATTACK

Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______

CONTROL, SAFEGUARD, COUNTERMEASURE

Technique used to compromise a system.- ______

EXPLOIT

A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______

VULNERABILITY

Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.

hands

IT SECURITY - is information security applied to ______ (most often some form of computer system).

technology

INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.

issues

Information security entails a sense of assurance that information risks and controls are ______.

balanced

HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.

mainframes

ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.

communication

Test your knowledge of information security terminologies with this quiz. Identify and understand key terms related to access, asset, attack, control, and safeguard in the context of organizational security measures.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser