Preview

Is404 Final Study Guide

Powerful Essays
Open Document
Open Document
840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is404 Final Study Guide
IS404 Final Study Guide

1.p6 Need to know the 4 broad categories for technologies. a Networks b System c Processes d Applications
2.p5 Need to know access control systems consists of 3 elements a Policies b Procedures c Tools
3.p16 The purpose of access control is to regulate interactions between a subject and an object, such as data, a network or device
4.p8 Need to know the Confidence in any authentication system can be measured by two components : the type of correlation and the number of authentication factors
5.p21 Access control threats cannot be 100% eliminated because new ones are constantly being devised.
6.p26-27 Quantitative risk assessment relies on several calculations a Single Loss Expectancy (SLE) b Annual Rate of Occurrence (ARO) c Annualized Loss Expectancy (ALE)
7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective
8.p35 Under system application domain, patch management is what?
Can be used to address security threats
9.p30 Where are access controls needed most?
Unless there is an asset of special importance stored on the network, it is unnecessary to place separate access controls on each asset
10.p45 Significant lots of overlap in security layers
11.p45 A classification scheme is a method of organizing sensitive information into various access levels.
12.p46 Anyone can gain access to unclassified information through legal means via the Freedom of Information Act (FOIA)
-13.p48 The privacy act of 1974 is related to the federal government.
14.p52-53 Why would you need to classify data? – Risk avoidance
15.p58 Operational efficiency: * The right information * The right people * The right time
16.p71-72 What’s a key requirement for HIPAA? – Security and privacy of Health data
17.p77 FERPA * Computer media * Written documents stored in the student folder *
18.p89 IT security policy framework consists of: * Policy *

You May Also Find These Documents Helpful

  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls…

    • 321 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    6. About the rights of individuals e.g.[10] personal data shall be processed in accordance with the rights of data subjects (individuals).…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    1. What are the three fundamental elements of an effective access control solution for information systems?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Authorization Rules: Controls will be configured to ensure access is approved for only company/corporate employees. These controls will be set up based off of the position (job roles) of the employees to ensure they can only access what is required to allow them to perform their duties. The policy will include group membership policies as well as authority-level policies. The employee access will be assigned to the appropriate groups and authority- level policies.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    2. Explain a scenario where a hacker may use Cross Site Request Forgery (CRFS) to perform authorized transactions.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays