Legal Issues in Information Security - C841
Answers Questions
Confidentiality, Integrity, Availability
CIA Triad
, a technique for encryption that shifts the
alphabet by some number of
Caesar Cipher
characters
Threats that operate inside An example of a technological and operational threat?
information systems to harm
information security goals.
Malicious code is an example of
these threats. Hardware and
software failures are technology
threats. Improperly running
processes are also threats
Facility-based threats. These An example of a physical and environmental threat?
types of threats can include a
facility breach caused by lax
physical security. Loss of heating
or cooling within a facility is an
example of an environmental
threat.
Risks that impact how an What is a system/service risk?
organization provides information
technology (IT) systems and
services.
Risks that affect the normal What is a Operational risk?
operation of information systems
and services
Risks that may have a lasting impact What is a Strategic risk?
on an organization's long-term
Using this strategy, organizations apply safeguards to vulnerabilities
Risk Mitigation
and threats to lower risk to an acceptable level.
also called logical safeguards , are the rules that state how
technical safeguards
systems will operate and are applied in the hardware and
software of information systems.
Most common two guides for ISO/IEC 27002:2013, and NIST Special Publication 800-53 (Rev. 4)
choosing safeguards
Big Data refers to large and complex data collections.
Tell users about information What documents are included in an organizations guidline documents?
security concerns and suggest
ways to deal with them.
Information Security the process used to keep data private.
an individual's right to control the use and disclosure of his or her
Privacy
own personal information.
Constitutional law, Federal law What sources define the scope of the right to privacy?
State law, Common law, and
Voluntary agreements
First, Third, Fourth, and Fifth Which amendment is the constitution contribute to the right to privacy?
Amendment
This amendment sets forth the right to freedom of religion, speech,
First Amendment the press, and assembly. Within these rights is the implicit right of
freedom of thought, which has a privacy component.
Answers Questions
Confidentiality, Integrity, Availability
CIA Triad
, a technique for encryption that shifts the
alphabet by some number of
Caesar Cipher
characters
Threats that operate inside An example of a technological and operational threat?
information systems to harm
information security goals.
Malicious code is an example of
these threats. Hardware and
software failures are technology
threats. Improperly running
processes are also threats
Facility-based threats. These An example of a physical and environmental threat?
types of threats can include a
facility breach caused by lax
physical security. Loss of heating
or cooling within a facility is an
example of an environmental
threat.
Risks that impact how an What is a system/service risk?
organization provides information
technology (IT) systems and
services.
Risks that affect the normal What is a Operational risk?
operation of information systems
and services
Risks that may have a lasting impact What is a Strategic risk?
on an organization's long-term
Using this strategy, organizations apply safeguards to vulnerabilities
Risk Mitigation
and threats to lower risk to an acceptable level.
also called logical safeguards , are the rules that state how
technical safeguards
systems will operate and are applied in the hardware and
software of information systems.
Most common two guides for ISO/IEC 27002:2013, and NIST Special Publication 800-53 (Rev. 4)
choosing safeguards
Big Data refers to large and complex data collections.
Tell users about information What documents are included in an organizations guidline documents?
security concerns and suggest
ways to deal with them.
Information Security the process used to keep data private.
an individual's right to control the use and disclosure of his or her
Privacy
own personal information.
Constitutional law, Federal law What sources define the scope of the right to privacy?
State law, Common law, and
Voluntary agreements
First, Third, Fourth, and Fifth Which amendment is the constitution contribute to the right to privacy?
Amendment
This amendment sets forth the right to freedom of religion, speech,
First Amendment the press, and assembly. Within these rights is the implicit right of
freedom of thought, which has a privacy component.