Information Security at Western Governors University | Flashcards & Summaries

Select your language

Suggested languages for you:
Log In Start studying!

Lernmaterialien für Information Security an der Western Governors University

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen Information Security Kurs an der Western Governors University zu.

TESTE DEIN WISSEN

Attacks consist of three main elements.

Lösung anzeigen
TESTE DEIN WISSEN

Type of Attack

Risk from Attack

Control of the Attack

Lösung ausblenden
TESTE DEIN WISSEN

Steps for Risk Management

Lösung anzeigen
TESTE DEIN WISSEN

Identify Assets

Identify Threats

Assess Vulnerabilities

Assess Risks

Mitigate Risks

Administrative Control

Repeat

Lösung ausblenden
TESTE DEIN WISSEN

What is compliance in the Cloud setting

Lösung anzeigen
TESTE DEIN WISSEN

The risk is shared and is portional to how much control over the settings the client has. 

Lösung ausblenden
TESTE DEIN WISSEN

Kerckhoff's 2nd principle in today's terms

Lösung anzeigen
TESTE DEIN WISSEN

Even if people know every bit of the system (except the key) they still should not be able to get in.

Lösung ausblenden
TESTE DEIN WISSEN

Define Digital Certificate

Lösung anzeigen
TESTE DEIN WISSEN

created to link a public key to a particular person. 

requires a public key and identifying information (name/address) then having them signed by a Certificate Authority (CA)

Lösung ausblenden
TESTE DEIN WISSEN

What is PII?

Lösung anzeigen
TESTE DEIN WISSEN

Personally Identifiable Information

Lösung ausblenden
TESTE DEIN WISSEN

Define Impact

Lösung anzeigen
TESTE DEIN WISSEN

Calculates the value of the asset and compares it to the risk. 

recipe=low risk

SSN=high risk

Lösung ausblenden
TESTE DEIN WISSEN

What is a One-Time Pad

Lösung anzeigen
TESTE DEIN WISSEN

aka Vernam Cipher
two copies of the key showing the shifts needed. Used for encryption and decryption

Primitive type of Stream Cipher

Lösung ausblenden
TESTE DEIN WISSEN

Elements of a High Level Incidence Reponse Process

Lösung anzeigen
TESTE DEIN WISSEN

Preparation

Detection and Analysis

Containment

Eradication

Recovery

Post-Incident Activity

Lösung ausblenden
TESTE DEIN WISSEN

List 4 security benefits for Accountability

Lösung anzeigen
TESTE DEIN WISSEN

1. Nonrepudiation

2. Deterrence

3. Detection & Prevention

4. Admissibility or Records

Lösung ausblenden
TESTE DEIN WISSEN

Two types of Symmetric Cryptography

Lösung anzeigen
TESTE DEIN WISSEN

1. Block Cipher

2. Stream Cipher


Lösung ausblenden
TESTE DEIN WISSEN

What is DRP

Lösung anzeigen
TESTE DEIN WISSEN

Disaster Recovery Plan

exactly what to do during and after a disaster

Lösung ausblenden
  • 8994 Karteikarten
  • 320 Studierende
  • 0 Lernmaterialien

Beispielhafte Karteikarten für deinen Information Security Kurs an der Western Governors University - von Kommilitonen auf StudySmarter erstellt!

Q:

Attacks consist of three main elements.

A:

Type of Attack

Risk from Attack

Control of the Attack

Q:

Steps for Risk Management

A:

Identify Assets

Identify Threats

Assess Vulnerabilities

Assess Risks

Mitigate Risks

Administrative Control

Repeat

Q:

What is compliance in the Cloud setting

A:

The risk is shared and is portional to how much control over the settings the client has. 

Q:

Kerckhoff's 2nd principle in today's terms

A:

Even if people know every bit of the system (except the key) they still should not be able to get in.

Q:

Define Digital Certificate

A:

created to link a public key to a particular person. 

requires a public key and identifying information (name/address) then having them signed by a Certificate Authority (CA)

Mehr Karteikarten anzeigen
Q:

What is PII?

A:

Personally Identifiable Information

Q:

Define Impact

A:

Calculates the value of the asset and compares it to the risk. 

recipe=low risk

SSN=high risk

Q:

What is a One-Time Pad

A:

aka Vernam Cipher
two copies of the key showing the shifts needed. Used for encryption and decryption

Primitive type of Stream Cipher

Q:

Elements of a High Level Incidence Reponse Process

A:

Preparation

Detection and Analysis

Containment

Eradication

Recovery

Post-Incident Activity

Q:

List 4 security benefits for Accountability

A:

1. Nonrepudiation

2. Deterrence

3. Detection & Prevention

4. Admissibility or Records

Q:

Two types of Symmetric Cryptography

A:

1. Block Cipher

2. Stream Cipher


Q:

What is DRP

A:

Disaster Recovery Plan

exactly what to do during and after a disaster

Information Security

Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

Jetzt loslegen

Das sind die beliebtesten Information Security Kurse im gesamten StudySmarter Universum

Information Assurance and Security

Ateneo de Zamboanga University

Zum Kurs
Shop Information

Alabama A&M University

Zum Kurs
Information systems

University of Stellenbosch

Zum Kurs
INFORMATION SECURITY(CHAPTER 1)

University of North West

Zum Kurs

Die all-in-one Lernapp für Studierende

Greife auf Millionen geteilter Lernmaterialien der StudySmarter Community zu
Kostenlos anmelden Information Security
Erstelle Karteikarten und Zusammenfassungen mit den StudySmarter Tools
Kostenlos loslegen Information Security