Risk Management Frameworks and Security in Computing

UnrestrictedAsteroid avatar
UnrestrictedAsteroid
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What are subjects in the context of security solutions?

Entities that execute activities and request access to objects

Which discipline of security is primarily concerned with protecting information from unintended emanations like radio and electrical signals?

EMSEC

What type of assets include information, data, and intellectual property?

Logical assets

In the context of security, what are objects?

Stems being protected by the system

Which category of security involves the protection of communications?

COMSEC

What does OPSEC primarily involve protecting within an organization?

Operational processes

What security domain is focused on protecting hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services?

Physical security

Which security domain involves ongoing measures to reduce the likelihood of unauthorized distribution and unavailability of an organization's assets due to insiders or known outsiders?

Personnel security

What does IT security focus on achieving and sustaining within an IT infrastructure?

Confidentiality, integrity, availability

Which security domain involves implementing standard operational procedures to achieve and sustain a known secure system state at all times?

Operational security

According to Raggad’s taxonomy of information security, what are the five continuously interacting components of a computing environment?

Activities, people, data, technology, networks

Which of the following best describes the focus of personnel security in an organization?

Preventing accidental or intentional theft or sabotage of system resources by insiders

Which of the following is NOT one of the six steps in the risk management procedure from Viega and McGraw?

Implement firewalls

What is the primary focus of computer security traditionally?

Preventing theft of hardware

Which term describes a weakness that allows an attacker to reduce a system's information assurance?

Vulnerability

What is the purpose of anti-virus software in computer security?

To detect and remove malicious software

Which security measure is specifically designed to protect against unauthorized access and cyber threats?

Computer firewall configuration

What aspect of secure computing devices do cybersecurity experts refer to as 'cyber security' or 'IT security'?

Firewall configuration

Explore the steps involved in a risk management framework and the evolving concept of computer security. Learn about assessing assets, threats, vulnerabilities, risks, and making risk management decisions.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser