Save
Terms in this set (45)
A breach of possession true
may not always result in a
breach of confidentiality
To achieve balance—that is, true
to operate an information
system that satisfies the
user and the security
professional—the security
level must allow reasonable
access, yet protect against
threats
According to the CNSS, true
networking is "the
protection of information
and its critical elements."
The history of information False, computer
security begins with the
concept of
communications security.
Much of the early research False, multiplexed
on computer security
centered on a system
called Management
Information and Computing
Service (MULTICS).
Information has False
redundancy when it is free
from mistakes or errors and
it has the value that the end
user expects.
, The role of the project
manager—typically an
executive such as a chief
information officer (CIO) or
the vice president of
information technology
(VP-IT)—in this effort cannot
be overstated.
Confidentiality ensures that
only those with the rights
and privileges to access
information are able to do
so
When unauthorized
individuals or systems can
view information,
confidentiality is breached
Indirect attacks originate
from a compromised
system or resource that is
malfunctioning or working
under the control of a
threat
A(n) hardware system is the
entire set of people,
procedures, and
technology that enable
business to use information.
The protection of the
confidentiality, integrity,
and availability of
information assets, whether
in storage, processing, or
transmission, via the
application of policy,
education, training and
awareness, and technology
is known as
Which of the following was
not an identified
fundamental problem with
ARPANET security?