Chapter 1- Security Principles Questions and Answers Graded A+
Chapter 1- Security Principles Questions and Answers Graded A+ Adequate Security - ANSSecurity commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information. Source: OMB Circular A-130 Administrative Controls - ANSControls implemented through policy and procedures. Examples include access control processes and requiring multiple personnel to conduct a specific operation. Administrative controls in modern environments are often enforced in conjunction with physical and/or technical controls, such as an access-granting policy for new users that requires login and approval by the hiring manager. Artificial Intelligence - ANSThe ability of computers and robots to simulate human intelligence and behavior. Asset - ANSAnything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property. Authentication - ANSThe act of identifying or verifying the eligibility of a station, originator, or individual to access specific categories of information. Typically, a measure designed to protect against fraudulent transmissions by establishing the validity of a transmission, message, station or originator. Authorization - ANSThe right or a permission that is granted to a system entity to access a system resource. NIST 800-82 Rev.2 Availability - ANSEnsuring timely and reliable access to and use of information by authorized users. Baseline - ANSA documented, lowest level of security configuration allowed by a standard or organization.
Geschreven voor
- Instelling
- Security Principles
- Vak
- Security Principles
Documentinformatie
- Geüpload op
- 15 december 2023
- Aantal pagina's
- 6
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
chapter 1 security principles questions and answe