Preview

Is404 Final Study Guide

Powerful Essays
Open Document
Open Document
840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is404 Final Study Guide
IS404 Final Study Guide

1.p6 Need to know the 4 broad categories for technologies. a Networks b System c Processes d Applications
2.p5 Need to know access control systems consists of 3 elements a Policies b Procedures c Tools
3.p16 The purpose of access control is to regulate interactions between a subject and an object, such as data, a network or device
4.p8 Need to know the Confidence in any authentication system can be measured by two components : the type of correlation and the number of authentication factors
5.p21 Access control threats cannot be 100% eliminated because new ones are constantly being devised.
6.p26-27 Quantitative risk assessment relies on several calculations a Single Loss Expectancy (SLE) b Annual Rate of Occurrence (ARO) c Annualized Loss Expectancy (ALE)
7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective
8.p35 Under system application domain, patch management is what?
Can be used to address security threats
9.p30 Where are access controls needed most?
Unless there is an asset of special importance stored on the network, it is unnecessary to place separate access controls on each asset
10.p45 Significant lots of overlap in security layers
11.p45 A classification scheme is a method of organizing sensitive information into various access levels.
12.p46 Anyone can gain access to unclassified information through legal means via the Freedom of Information Act (FOIA)
-13.p48 The privacy act of 1974 is related to the federal government.
14.p52-53 Why would you need to classify data? – Risk avoidance
15.p58 Operational efficiency: * The right information * The right people * The right time
16.p71-72 What’s a key requirement for HIPAA? – Security and privacy of Health data
17.p77 FERPA * Computer media * Written documents stored in the student folder *
18.p89 IT security policy framework consists of: * Policy *

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    4. All permissions and policies will be uniform when Active Directory is employed into the infrastructure. Administrators can change permissions and privileges to meet requirements for that group or department.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system…

    • 766 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Solution: Limit user privileges that only include those that are required by the duties that are assigned to that individual. This will hopefully make it clear that no removable storage devices are to be connected to the network, no matter the circumstances unless they are screened first.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pt1420 Unit 4 Study Guide

    • 646 Words
    • 3 Pages

    Throughout the course of United States History, both parties would evolve from having clearly defined ideals to those which overlap as the socio-political landscape of America has grown in complexity prompting ambiguity of what being a Democrat or a Republican even means.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    6. About the rights of individuals e.g.[10] personal data shall be processed in accordance with the rights of data subjects (individuals).…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The Data protection Act also allows people to see information recorded about them through the Freedom of Information Act 2000, therefore people are allowed to see their social care files, this is important to know when entering information in people’s notes. The ICO Information Commissioner’s Office is responsible for upholding information rights in the public interest.…

    • 981 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays