IT 417 Chapter - 01 - Introduction - To - Information - Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Name: Class: Date:

Chapter 01: Introduction to Information Security


True / False

1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
the products of the systems, and sabotage.
a. True
b. False
ANSWER: True

2. Network security focuses on the protection of the details of a particular operation or series of activities.
a. True
b. False
ANSWER: False

3. The value of information comes from the characteristics it possesses.


a. True
b. False
ANSWER: True

4. When a computer is the subject of an attack, it is the entity being attacked.


a. True
b. False
ANSWER: False

5. An e-mail virus involves sending an e-mail message with a modified field.


a. True
b. False
ANSWER: False

6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False

7. A breach of possession always results in a breach of confidentiality.


a. True
b. False
ANSWER: False

8. Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
a. True
b. False
ANSWER: False

9. Information security can be an absolute.


a. True

Cengage Learning Testing, Powered by Cognero Page 1


Name: Class: Date:

Chapter 01: Introduction to Information Security

b. False
ANSWER: False

10. To achieve balance — that is, to operate an information system that satisfies the user and the security professional —
the security level must allow reasonable access, yet protect against threats.
a. True
b. False
ANSWER: True

11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
b. False
ANSWER: False

12. Using a methodology increases the probability of success.


a. True
b. False
ANSWER: True

13. The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
a. True
b. False
ANSWER: False

14. The investigation phase of the SecSDLC begins with a directive from upper management.
a. True
b. False
ANSWER: True

15. The physical design is the blueprint for the desired solution.
a. True
b. False
ANSWER: False

16. Many states have implemented legislation making certain computer-related activities illegal.
a. True
b. False
ANSWER: True

17. Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software
attack that requires some degree of application reconstruction.
a. True
b. False
ANSWER: False

Cengage Learning Testing, Powered by Cognero Page 2


Name: Class: Date:

Chapter 01: Introduction to Information Security


18. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
a. True
b. False
ANSWER: False

19. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
the information.
a. True
b. False
ANSWER: True

20. The roles of information security professionals are almost always aligned with the goals and mission of the
information security community of interest.
a. True
b. False
ANSWER: True

Modified True / False

21. MULTICS stands for Multiple Information and Computing Service. _________________________
ANSWER: False - Multiplexed

22. According to the CNSS, networking is “the protection of information and its critical elements.”
_________________________
ANSWER: False - information security

23. Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of
a threat. _________________________
ANSWER: False - Indirect

24. Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.
_________________________
ANSWER: False - accuracy

25. When unauthorized individuals or systems can view information, confidentiality is breached.
_________________________
ANSWER: True

26. Confidentiality ensures that only those with the rights and privileges to access information are able to do so.
_________________________
ANSWER: True

27. Hardware is the physical technology that houses and executes the software, stores and transports the data, and
provides interfaces for the entry and removal of information from the system. _________________________
ANSWER: True

Cengage Learning Testing, Powered by Cognero Page 3


Name: Class: Date:

Chapter 01: Introduction to Information Security


28. Policies are detailed written instructions for accomplishing a specific task. _________________________
ANSWER: False - Procedures

29. Information security can begin as a grassroots effort in which systems administrators attempt to improve the security
of their systems, often referred to as the bottom-up approach. _________________________
ANSWER: True

30. Key end users should be assigned to a developmental team, known as the united application development team.
_________________________
ANSWER: False - joint

31. Of the two approaches to information security implementation, the top-down approach has a higher probability of
success. _________________________
ANSWER: True

32. The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an
information system. _________________________
ANSWER: False - Systems

33. The Analysis phase of the SecSDLC begins the methodology initiated by a directive from upper management.
_________________________
ANSWER: False - Investigation

34. Risk evaluation is the process of identifying, assessing, and evaluating the levels of risk facing the organization,
specifically the threats to the organization’s security and to the information stored and processed by the organization.
_________________________
ANSWER: False - management

35. A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the
technical and nontechnical areas. _________________________
ANSWER: True

Multiple Choice

36. __________ is a network project that preceded the Internet.


a. NIST b. ARPANET
c. FIPS d. DES
ANSWER: b

37. The famous study entitled “Protection Analysis: Final Report” focused on a project undertaken by ARPA to
understand and detect __________ in operating systems security.
a. Bugs b. Vulnerabilities
c. Malware d. Maintenance hooks
ANSWER: b

38. __________ was the first operating system to integrate security as its core functions.
a. UNIX b. DOS

Cengage Learning Testing, Powered by Cognero Page 4


Name: Class: Date:

Chapter 01: Introduction to Information Security

c. MULTICS d. ARPANET
ANSWER: c

39. __________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization
from unauthorized access and misuse.
a. Physical b. Personal
c. Object d. Standard
ANSWER: a

40. A server would experience a __________ attack when a hacker compromises it to acquire information from it from a
remote location using a network connection.
a. indirect b. direct
c. software d. hardware
ANSWER: b

41. A computer is the __________ of an attack when it is used to conduct an attack against another computer.
a. subject b. object
c. target d. facilitator
ANSWER: a

42. __________ of information is the quality or state of being genuine or original.


a. Authenticity b. Spoofing
c. Confidentiality d. Authorization
ANSWER: a

43. In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single
number called the __________ value.
a. result b. smashing
c. hash d. code
ANSWER: c

44. __________ has become a widely accepted evaluation standard for training and education related to the security of
information systems.
a. NIST SP 800-12 b. NSTISSI No. 4011
c. IEEE 802.11(g) d. ISO 17788
ANSWER: b

45. An information system is the entire set of __________, people, procedures, and networks that make possible the use of
information resources in the organization.
a. software b. hardware
c. data d. All of the above
ANSWER: d

46. A methodology for the design and implementation of an information system that is a formal development strategy is
referred to as a __________.
a. systems design b. development life project
Cengage Learning Testing, Powered by Cognero Page 5
Name: Class: Date:

Chapter 01: Introduction to Information Security

c. systems development life cycle d. systems schema


ANSWER: c

47. A variation of n SDLC that can be used to implement information security solutions in an organizations with little or
no formal security in place is the __________.
a. SecDSLC b. SecSDLC
c. LCSecD d. CLSecD
ANSWER: b

48. A type of SDLC where each phase has results that flow into the next phase is called the __________ model.
a. pitfall b. SA&D
c. waterfall d. Method 7
ANSWER: c

49. During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in
the prior phases.
a. investigation b. implementation
c. analysis d. physical design
ANSWER: d

50. Which of the following phases is often considered the longest and most expensive phase of the systems development
life cycle?
a. investigation b. logical design
c. implementation d. maintenance and change
ANSWER: d

51. Organizations are moving toward more __________-focused development approaches, seeking to improve not only
the functionality of the systems they have in place, but consumer confidence in their product.
a. security b. reliability
c. accessibility d. availability
ANSWER: a

52. Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what
immediate steps are taken when an attack occurs.
a. Continuity planning b. Incident response
c. Disaster recovery d. Security response
ANSWER: b

53. The ____ is the individual primarily responsible for the assessment, management, and implementation of information
security in the organization.
a. ISO b. CIO
c. CISO d. CTO
ANSWER: c

54. Which of the following is a valid type of role when it comes to data ownership?
a. Data owners b. Data custodians
Cengage Learning Testing, Powered by Cognero Page 6
Name: Class: Date:

Chapter 01: Introduction to Information Security

c. Data users d. All of the above


ANSWER: d

55. People with the primary responsibility for administering the systems that house the information used by the
organization perform the ____ role.
a. Security policy developers b. Security professionals
c. System administrators d. End users
ANSWER: c

Completion

56. The history of information security begins with the concept of ____________________ security.
ANSWER: computer

57. During the early years, information security was a straightforward process composed predominantly of
____________________ security and simple document classification schemes.
ANSWER: physical

58. During the ____________________ War, many mainframes were brought online to accomplish more complex and
sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than
mailing magnetic tapes between computer centers.
ANSWER: Cold

59. The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-
connected local area network.
ANSWER: connectivity

60. The CNSS model of information security evolved from a concept developed by the computer security industry known
as the ____________________ triangle.
ANSWER: CIA
C.I.A.
Confidentiality, Integrity, and Availability

61. A computer is the ____________________ of an attack when it is the entity being targeted.
ANSWER: object

62. ____________________ enables authorized users — persons or computer systems — to access information without
interference or obstruction and to receive it in the required format.
ANSWER: Availability

63. ____________________ of information is the quality or state of being genuine or original, rather than a reproduction
or fabrication.
ANSWER: Authenticity

64. Information has ____________________ when it is whole, complete, and uncorrupted.


ANSWER: integrity

65. In an organization, the value of ____________________ of information is especially high when it involves personal
Cengage Learning Testing, Powered by Cognero Page 7
Name: Class: Date:

Chapter 01: Introduction to Information Security


information about employees, customers, or patients.
ANSWER: confidentiality

66. The ____________________ of information is the quality or state of ownership or control of some object or item.
ANSWER: possession

67. The ____________________ component of the IS comprises applications, operating systems, and assorted command
utilities.
ANSWER: software

68. Software is often created under the constraints of ____________________ management, placing limits on time, cost,
and manpower.
ANSWER: project

69. A frequently overlooked component of an information system, ____________________ are the written instructions
for accomplishing a specific task.
ANSWER: procedures

70. In the ____________________ approach, the project is initiated by upper-level managers who issue policy,
procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
ANSWER: top-down

71. A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of
procedures.
ANSWER: methodology

72. The ____________________ phase consists primarily of assessments of the organization, its current systems, and its
capability to support the proposed systems.
ANSWER: analysis

73. A(n) ____________________ information security policy outlines the implementation of a security program within
the organization.
ANSWER: enterprise

74. The senior technology officer is typically the chief ____________________ officer.
ANSWER: information

75. A(n) ____________________ is a group of individuals who are united by similar interests or values within an
organization and who share a common goal of helping the organization to meet its objectives.
ANSWER: community of interest

Essay

76. Describe the multiple types of security systems present in many organizations.
ANSWER: A successful organization should have the following multiple layers of security in place to protect its
operations, including physical, personnel, operations, communications, network, and information.
Physical security, to protect physical items, objects, or areas from unauthorized access and misuse

Cengage Learning Testing, Powered by Cognero Page 8


Name: Class: Date:

Chapter 01: Introduction to Information Security

Personnel security, to protect the individual or group of individuals who are authorized to access the
organization and its operations
Operations security, to protect the details of a particular operation or series of activities
Communications security, to protect communications media, technology, and content
Network security, to protect networking components, connections, and contents
Information security, to protect the confidentiality, integrity and availability of information assets, whether in
storage, processing or transmission. It is achieved via the application of policy, education, training and
awareness, and technology.

77. List and describe the six phases of the security systems development life cycle.
ANSWER: Investigation
The investigation phase of the SecSDLC begins with a directive from upper management, dictating the
process, outcomes, and goals of the project, as well as its budget and other constraints. Frequently, this phase
begins with an enterprise information security policy, which outlines the implementation of a security
program within the organization. Teams of responsible managers, employees, and contractors are organized;
problems are analyzed; and the scope of the project, as well as specific goals and objectives, and any
additional constraints not covered in the program policy, are defined. Finally, an organizational feasibility
analysis is performed to determine whether the organization has the resources and commitment necessary to
conduct a successful security analysis and design.

Analysis
In the analysis phase, the documents from the investigation phase are studied. The development team conducts
a preliminary analysis of existing security policies or programs, along with that of documented current threats
and associated controls. This phase also includes an analysis of relevant legal issues that could affect the
design of the security solution. Increasingly, privacy laws have become a major consideration when making
decisions about information systems that manage personal information. Recently, many states have
implemented legislation making certain computer-related activities illegal. A detailed understanding of these
issues is vital. The risk management task also begins in this stage. Risk management is the process of
identifying, assessing, and evaluating the levels of risk facing the organization, specifically the threats to the
organization’s security and to the information stored and processed by the organization.

Logical Design
The logical design phase creates and develops the blueprints for information security, and examines and
implements key policies that influence later decisions. Also at this stage, the team plans the incident response
actions to be taken in the event of partial or catastrophic loss. The planning answers the following questions:
- Continuity planning: How will business continue in the event of a loss?
- Incident response:What steps are taken when an attack occurs?
- Disaster recovery:What must be done to recover information and vital systems immediately after a disastrous
event?
Next, a feasibility analysis determines whether or not the project should be continued or be outsourced.

Physical Design
In the physical design phase, the information security technology needed to support the blueprint outlined in
the logical design is evaluated, alternative solutions generated, and a final design agreed upon. The
information security blueprint may be revisited to keep it in line with the changes needed when the physical
design is completed. Criteria for determining the definition of successful solutions are also prepared during
this phase. Included at this time are the designs for physical security measures to support the proposed
technological solutions. At the end of this phase, a feasibility study should determine the readiness of the
Cengage Learning Testing, Powered by Cognero Page 9
Name: Class: Date:

Chapter 01: Introduction to Information Security

organization for the proposed project, and then the champion and sponsors are presented with the design. At
this time, all parties involved have a chance to approve the project before implementation begins.

Implementation
The implementation phase in of SecSDLC is also similar to that of the traditional SDLC. The security
solutions are acquired (made or bought), tested, implemented, and tested again. Personnel issues are evaluated,
and specific training and education programs conducted. Finally, the entire tested package is presented to
upper management for final approval.

Maintenance and Change


The maintenance and change phase, though last, is perhaps most important, given the current ever-changing
threat environment. Today’s information security systems need constant monitoring, testing,modification,
updating, and repairing. Traditional applications systems developed within the framework of the traditional
SDLC are not designed to anticipate a vicious attack that would require some degree of application
reconstruction. In information security, the battle for stable, reliable systems is a defensive one. Often,
repairing damage and restoring information is a constant effort against an unseen adversary. As new threats
emerge and old threats evolve, the information security profile of an organization requires constant adaptation
to prevent threats from successfully penetrating sensitive data. This constant vigilance and security can be
compared to that of a fortress where threats from outside as well as from within must be constantly monitored
and checked with continuously new and more innovative technologies.

78. Outline types of data ownership and their respective responsibilities.


ANSWER: Data owners: Those responsible for the security and use of a particular set of information. They are usually
members of senior management and could be CIOs. The data owners usually determine the level of data
classification associated with the data, as well as the changes to that classification required by organizational
change.

Data custodians: Working directly with data owners, data custodians are responsible for the storage,
maintenance, and protection of the information. The duties of a data custodian often include overseeing data
storage and backups, implementing the specific procedures and policies laid out in the security policies and
plans, and reporting to the data owner.

Data users: End users who work with the information to perform their daily jobs supporting the mission of the
organization. Data users are included as individuals with an information security role.

Cengage Learning Testing, Powered by Cognero Page 10

You might also like