18 Questions
What are subjects in the context of security solutions?
Entities that execute activities and request access to objects
Which discipline of security is primarily concerned with protecting information from unintended emanations like radio and electrical signals?
EMSEC
What type of assets include information, data, and intellectual property?
Logical assets
In the context of security, what are objects?
Stems being protected by the system
Which category of security involves the protection of communications?
COMSEC
What does OPSEC primarily involve protecting within an organization?
Operational processes
What security domain is focused on protecting hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services?
Physical security
Which security domain involves ongoing measures to reduce the likelihood of unauthorized distribution and unavailability of an organization's assets due to insiders or known outsiders?
Personnel security
What does IT security focus on achieving and sustaining within an IT infrastructure?
Confidentiality, integrity, availability
Which security domain involves implementing standard operational procedures to achieve and sustain a known secure system state at all times?
Operational security
According to Raggad’s taxonomy of information security, what are the five continuously interacting components of a computing environment?
Activities, people, data, technology, networks
Which of the following best describes the focus of personnel security in an organization?
Preventing accidental or intentional theft or sabotage of system resources by insiders
Which of the following is NOT one of the six steps in the risk management procedure from Viega and McGraw?
Implement firewalls
What is the primary focus of computer security traditionally?
Preventing theft of hardware
Which term describes a weakness that allows an attacker to reduce a system's information assurance?
Vulnerability
What is the purpose of anti-virus software in computer security?
To detect and remove malicious software
Which security measure is specifically designed to protect against unauthorized access and cyber threats?
Computer firewall configuration
What aspect of secure computing devices do cybersecurity experts refer to as 'cyber security' or 'IT security'?
Firewall configuration
Explore the steps involved in a risk management framework and the evolving concept of computer security. Learn about assessing assets, threats, vulnerabilities, risks, and making risk management decisions.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free