ISBB Chapter 6 - Information Systems Security questions well answered 2023
ISBB Chapter 6 - Information Systems SecurityAccess Control To ensure that that the user can only access the information resources that are appropriate. It determines which users can authorized to read, modify, add, and/or delete information. Authentication Making sure a person is who they say they are. Three factor identification: Identifying someone: something they know, something they have, or something they are. Availability That information can be accessed and modified by anyone authorized to do so in appropriate time frame. Backup The procedure for making extra copies of data in case the original is lost or damaged. Biometric Authentication A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. Example, a fingerprint scan. Confidentiality Protecting information, to be able to restrict access to only those who are allowed to see it. Encryption The process of encoding data upon its transmission or storage so that only authorized individuals can read it. FERPA Family Educational Rights and Privacy Act. This act restricts who has access to student information. Firewall A software program or hardware device that is used to increase security on its network by blocking unwanted messages/data. HIPPA Health Insurance Portability and Accountability Act. Health care organizations are obligated to follow several regulations regarding people's medical data, particularly patient privacy. Integrity The assurance that the information being accessed has not been altered and truly represents what is intended. Intrustion Detection System Works to provide the functionality to identify if the network is being attacked. Multifactor Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction. Physical Security The protection of the actual hardware and networking components that store and transmit information resources. Universal Power Supply A device that provides battery backup to critical components of the system, allowing they system to stay online longer and/or allowing the IT Staff to shut them down using proper procedures in order to prevent the data loss that might occur from power failure. VPN A virtual private network allows user who are outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Written for
- Institution
- ISBB
- Course
- ISBB
Document information
- Uploaded on
- October 13, 2023
- Number of pages
- 2
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isbb chapter 6 information systems security
Also available in package deal