Risk Management Frameworks and Security in Computing
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are subjects in the context of security solutions?

  • System assets
  • Entities that execute activities and request access to objects (correct)
  • Logical assets
  • Physical assets
  • Which discipline of security is primarily concerned with protecting information from unintended emanations like radio and electrical signals?

  • OPSEC
  • TRANSEC
  • EMSEC (correct)
  • COMPUSEC
  • What type of assets include information, data, and intellectual property?

  • System assets
  • Adminstrative assets
  • Logical assets (correct)
  • Physical assets
  • In the context of security, what are objects?

    <p>Stems being protected by the system</p> Signup and view all the answers

    Which category of security involves the protection of communications?

    <p>COMSEC</p> Signup and view all the answers

    What does OPSEC primarily involve protecting within an organization?

    <p>Operational processes</p> Signup and view all the answers

    What security domain is focused on protecting hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services?

    <p>Physical security</p> Signup and view all the answers

    Which security domain involves ongoing measures to reduce the likelihood of unauthorized distribution and unavailability of an organization's assets due to insiders or known outsiders?

    <p>Personnel security</p> Signup and view all the answers

    What does IT security focus on achieving and sustaining within an IT infrastructure?

    <p>Confidentiality, integrity, availability</p> Signup and view all the answers

    Which security domain involves implementing standard operational procedures to achieve and sustain a known secure system state at all times?

    <p>Operational security</p> Signup and view all the answers

    According to Raggad’s taxonomy of information security, what are the five continuously interacting components of a computing environment?

    <p>Activities, people, data, technology, networks</p> Signup and view all the answers

    Which of the following best describes the focus of personnel security in an organization?

    <p>Preventing accidental or intentional theft or sabotage of system resources by insiders</p> Signup and view all the answers

    Which of the following is NOT one of the six steps in the risk management procedure from Viega and McGraw?

    <p>Implement firewalls</p> Signup and view all the answers

    What is the primary focus of computer security traditionally?

    <p>Preventing theft of hardware</p> Signup and view all the answers

    Which term describes a weakness that allows an attacker to reduce a system's information assurance?

    <p>Vulnerability</p> Signup and view all the answers

    What is the purpose of anti-virus software in computer security?

    <p>To detect and remove malicious software</p> Signup and view all the answers

    Which security measure is specifically designed to protect against unauthorized access and cyber threats?

    <p>Computer firewall configuration</p> Signup and view all the answers

    What aspect of secure computing devices do cybersecurity experts refer to as 'cyber security' or 'IT security'?

    <p>Firewall configuration</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser