Information Security Terminologies Quiz
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______

ACCESS

The organizational resource that is being protected.- ______

ASSET

An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______

ATTACK

Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______

<p>CONTROL, SAFEGUARD, COUNTERMEASURE</p> Signup and view all the answers

Technique used to compromise a system.- ______

<p>EXPLOIT</p> Signup and view all the answers

A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______

<p>VULNERABILITY</p> Signup and view all the answers

Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.

<p>hands</p> Signup and view all the answers

IT SECURITY - is information security applied to ______ (most often some form of computer system).

<p>technology</p> Signup and view all the answers

INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.

<p>issues</p> Signup and view all the answers

Information security entails a sense of assurance that information risks and controls are ______.

<p>balanced</p> Signup and view all the answers

HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.

<p>mainframes</p> Signup and view all the answers

ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.

<p>communication</p> Signup and view all the answers

More Like This

Information Security Triad
10 questions
Information Security Terminologies
40 questions
Terminologi i informasjonssikkerhet
40 questions
Use Quizgecko on...
Browser
Browser