Systems Security: Chapters 1-15 ) – Questions With
Verified Solutions
Save
Practice questions for this set
Learn 1 /7 Study with Learn
A = (Total Uptime)/(Total Uptime + Total Downtime)
Choose an answer
What is unauthorized access, and how Define Confidentiality in regard to the
1 2
can it lead to data breaches? CIA-triad
3 Define Availability as a calculation 4 GLBA (Gramm-Leach-Bliley Act)
Don't know?
Terms in this set (91)
Unauthorized access is the ability or act of getting onto
a system without permission, or having greater access
What is unauthorized
to the system than you should (for instance, by getting
access, and how can it lead
someone's user ID and password). Getting onto a
to data breaches?
system you shouldn't means getting access to data you
shouldn't.
, Regulations passed by Congress to reduce unethical
Sarbanes-Oxley Act (SOX) corporate behavior. Regulated by the SEC (Securities
and Exchange Commission)
US Law that requires healthcare organizations to have
HIPPA (Health Insurance
security and privacy controls implemented to ensure
Portability and
patient privacy. Regulated by the HSS (Department of
Accountability Act)
Health and Human Services)
Requires federal civilian agencies to provide security
FISMA (Federal Information controls over resources that support federal operations.
Security Management Act) Regulated by the DHS (Department of Homeland
Security)
Federal law enacted in 1999 to control the ways that
GLBA (Gramm-Leach-Bliley financial institutions deal with the private information of
Act) individuals. Regulated by the FTC (Federal Trade
Commission).
PCI DSS (Payment Card Global Standard that requires protection of credit card
Industry Data Security customer privacy data with proper security controls.
Standard)
A federal law that regulates the management of student
FERPA (Family Educational records and disclosure of information from those
Rights and Privacy Act) records. Regulated by the DOE (US Department of
Education)
US law requiring Internet filtering in US most schools
CIPA (Children's Internet
and libraries. Regulated by the FTC (Federal Trade
Protection Act)
Commission)
A security control is something put in place that is used
to reduce risks toward an asset or organization.
Explain what a security (Security awareness training, IT security policy
control is frameworks, layered security solution for IT
infrastructure, periodic security risk assessments,
enabling monitoring, etc;)
1) Ethernet LAN
List three physical elements
2) File Server and Print Server
of the LAN domain.
3) Wireless Access Point
1) System Administration
List three logical elements
2) Design of Directory and File Services
of the LAN domain.
3) Design of Virtual LANs