SNHU CYB 200 CHAPTER 1
IoT - answer(Internet of Things) refers to a network of physical objects of things that are
embedded with electronics, sensors, software, and network creativity. These physical
objects can exchange data with each other
identity theft - answer
CYBERSPACE - answer
Transmission Control Protocol/Internet Protocol (TCP/IP) - answer suite of protocols
developed for communicating across a network
Transmission Control Protocol/Internet Protocol (TCP/IP) – answer breakes messages
into chunks/packets - data readable in each IP packet
Transmission Control Protocol/Internet Protocol (TCP/IP) - answer readable mode is
"cleartext" data must be encrypted
unified communications - answerthe integration of communication channels into a single
service
unified communications - answerreal-time Session Initiaion Protocol-enabled
applications (SIP-enabled applications) (ex. Skype)
risk - answerlevel of exposure to some event that has an effect on an asset(computer,
database, piece of info)
threat - answerany action, natural or human induced, that can damage an asset
vulnerability - answerweakness that allows a threat to be realized or have an effect on
an asset
End-User License Agreement (EULA) - answerTAKES EFFECT WHEN SOFTWARE
INSTALLED - BURDEN OF PROTECTING IT SYSTEM ON IT SECURITY PROS
End-User License Agreement (EULA) - answerBETWEEN USER AND SOFTWARE
VENDOR
SECURITY - answerbeing free from danger or threat
INFORMATION SYSTEMS SECURITY - answerCOLLECTION OF ACTIVITES THAT
PROTECT THE INFO SYSTEM AND STORED DATA
, FISMA (Federal Information Security Management Act) 2002 - answerFED CIVILIAN
AGENCIES TO PROVIDDE SEC CONTROLS OVER FED OPERATIONS
FISMA FEDERAL INFO SEC MODERNIZATION ACT 2014 - answerUPDATE
MODERN THREATS
SOX Act of 2002 - answerRequires managers and auditors of public companies to
document and certify the system of internal control
GLBA (1999) - answer"Graham-Leach-Bliley Act" (Financial Services Modernization Act
of 1999) repealed a 1933 law that barred the consolidation of financial institutions and
insurance companies. Included within GLBA are multiple sections relating to the privacy
of financial information. Companies must provide written notice to consumers of their
privacy rights and explain the company's procedures for safeguarding data.
HIPPA - answerHealth Insurance Portability and Accountability Act -IMPLEMENT SEC
PRIV CONTROLS
CIPA 2000/2011 - answerChildren's Internet Protection Act - PUBL SCHOOLS/LIBR TO
USE INTERNET SAFETY POLICY
FERPA (1974) - answerFamily Educational Rights and Privacy Act, limits disclosure of
student records; Involves Privacy Rule of 2001 - established national rights for privacy
and security concerning health records
EU GDPR - answerPROT CITIZENS INDIVIDUAL DATA
TENETS OF IT SYS SEC (CIA TRIAD) - answerCONFIDENTIALITY, INTEGRITY,
AVAILABILITY
CONFIDENTIALITY - answerONLY AUTHORIZED USERS CAN VIEW INFO
INTEGRITY - answerONLY AUTHORIZED USERS CAN CHANGE INFORMATION/
VALIDITY AND ACCURACY OF DATA
AVAILABILITY - answerINFO ACCESSIBLE BY AUTHORIZED USERS WHENEVER
REQUEST INFORMATION
EMAIL TRAFFIC TRANSMITS THRU INTERNET IN - answerCLEARTEXT
DATA CLASSIFICATIN STANDARD - answerDEFINES HOW TO TREAT DATA
THROUGHOUT IT INFRASTRUCTURE
HTTPS - answerHypertext Transfer Protocol Secure
IoT - answer(Internet of Things) refers to a network of physical objects of things that are
embedded with electronics, sensors, software, and network creativity. These physical
objects can exchange data with each other
identity theft - answer
CYBERSPACE - answer
Transmission Control Protocol/Internet Protocol (TCP/IP) - answer suite of protocols
developed for communicating across a network
Transmission Control Protocol/Internet Protocol (TCP/IP) – answer breakes messages
into chunks/packets - data readable in each IP packet
Transmission Control Protocol/Internet Protocol (TCP/IP) - answer readable mode is
"cleartext" data must be encrypted
unified communications - answerthe integration of communication channels into a single
service
unified communications - answerreal-time Session Initiaion Protocol-enabled
applications (SIP-enabled applications) (ex. Skype)
risk - answerlevel of exposure to some event that has an effect on an asset(computer,
database, piece of info)
threat - answerany action, natural or human induced, that can damage an asset
vulnerability - answerweakness that allows a threat to be realized or have an effect on
an asset
End-User License Agreement (EULA) - answerTAKES EFFECT WHEN SOFTWARE
INSTALLED - BURDEN OF PROTECTING IT SYSTEM ON IT SECURITY PROS
End-User License Agreement (EULA) - answerBETWEEN USER AND SOFTWARE
VENDOR
SECURITY - answerbeing free from danger or threat
INFORMATION SYSTEMS SECURITY - answerCOLLECTION OF ACTIVITES THAT
PROTECT THE INFO SYSTEM AND STORED DATA
, FISMA (Federal Information Security Management Act) 2002 - answerFED CIVILIAN
AGENCIES TO PROVIDDE SEC CONTROLS OVER FED OPERATIONS
FISMA FEDERAL INFO SEC MODERNIZATION ACT 2014 - answerUPDATE
MODERN THREATS
SOX Act of 2002 - answerRequires managers and auditors of public companies to
document and certify the system of internal control
GLBA (1999) - answer"Graham-Leach-Bliley Act" (Financial Services Modernization Act
of 1999) repealed a 1933 law that barred the consolidation of financial institutions and
insurance companies. Included within GLBA are multiple sections relating to the privacy
of financial information. Companies must provide written notice to consumers of their
privacy rights and explain the company's procedures for safeguarding data.
HIPPA - answerHealth Insurance Portability and Accountability Act -IMPLEMENT SEC
PRIV CONTROLS
CIPA 2000/2011 - answerChildren's Internet Protection Act - PUBL SCHOOLS/LIBR TO
USE INTERNET SAFETY POLICY
FERPA (1974) - answerFamily Educational Rights and Privacy Act, limits disclosure of
student records; Involves Privacy Rule of 2001 - established national rights for privacy
and security concerning health records
EU GDPR - answerPROT CITIZENS INDIVIDUAL DATA
TENETS OF IT SYS SEC (CIA TRIAD) - answerCONFIDENTIALITY, INTEGRITY,
AVAILABILITY
CONFIDENTIALITY - answerONLY AUTHORIZED USERS CAN VIEW INFO
INTEGRITY - answerONLY AUTHORIZED USERS CAN CHANGE INFORMATION/
VALIDITY AND ACCURACY OF DATA
AVAILABILITY - answerINFO ACCESSIBLE BY AUTHORIZED USERS WHENEVER
REQUEST INFORMATION
EMAIL TRAFFIC TRANSMITS THRU INTERNET IN - answerCLEARTEXT
DATA CLASSIFICATIN STANDARD - answerDEFINES HOW TO TREAT DATA
THROUGHOUT IT INFRASTRUCTURE
HTTPS - answerHypertext Transfer Protocol Secure