IT 417 Chapter - 01 - Introduction - To - Information - Security
IT 417 Chapter - 01 - Introduction - To - Information - Security
IT 417 Chapter - 01 - Introduction - To - Information - Security
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
the products of the systems, and sabotage.
a. True
b. False
ANSWER: True
2. Network security focuses on the protection of the details of a particular operation or series of activities.
a. True
b. False
ANSWER: False
6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False
8. Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
a. True
b. False
ANSWER: False
b. False
ANSWER: False
10. To achieve balance — that is, to operate an information system that satisfies the user and the security professional —
the security level must allow reasonable access, yet protect against threats.
a. True
b. False
ANSWER: True
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
b. False
ANSWER: False
13. The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
a. True
b. False
ANSWER: False
14. The investigation phase of the SecSDLC begins with a directive from upper management.
a. True
b. False
ANSWER: True
15. The physical design is the blueprint for the desired solution.
a. True
b. False
ANSWER: False
16. Many states have implemented legislation making certain computer-related activities illegal.
a. True
b. False
ANSWER: True
17. Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software
attack that requires some degree of application reconstruction.
a. True
b. False
ANSWER: False
19. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
the information.
a. True
b. False
ANSWER: True
20. The roles of information security professionals are almost always aligned with the goals and mission of the
information security community of interest.
a. True
b. False
ANSWER: True
21. MULTICS stands for Multiple Information and Computing Service. _________________________
ANSWER: False - Multiplexed
22. According to the CNSS, networking is “the protection of information and its critical elements.”
_________________________
ANSWER: False - information security
23. Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of
a threat. _________________________
ANSWER: False - Indirect
24. Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.
_________________________
ANSWER: False - accuracy
25. When unauthorized individuals or systems can view information, confidentiality is breached.
_________________________
ANSWER: True
26. Confidentiality ensures that only those with the rights and privileges to access information are able to do so.
_________________________
ANSWER: True
27. Hardware is the physical technology that houses and executes the software, stores and transports the data, and
provides interfaces for the entry and removal of information from the system. _________________________
ANSWER: True
29. Information security can begin as a grassroots effort in which systems administrators attempt to improve the security
of their systems, often referred to as the bottom-up approach. _________________________
ANSWER: True
30. Key end users should be assigned to a developmental team, known as the united application development team.
_________________________
ANSWER: False - joint
31. Of the two approaches to information security implementation, the top-down approach has a higher probability of
success. _________________________
ANSWER: True
32. The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an
information system. _________________________
ANSWER: False - Systems
33. The Analysis phase of the SecSDLC begins the methodology initiated by a directive from upper management.
_________________________
ANSWER: False - Investigation
34. Risk evaluation is the process of identifying, assessing, and evaluating the levels of risk facing the organization,
specifically the threats to the organization’s security and to the information stored and processed by the organization.
_________________________
ANSWER: False - management
35. A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the
technical and nontechnical areas. _________________________
ANSWER: True
Multiple Choice
37. The famous study entitled “Protection Analysis: Final Report” focused on a project undertaken by ARPA to
understand and detect __________ in operating systems security.
a. Bugs b. Vulnerabilities
c. Malware d. Maintenance hooks
ANSWER: b
38. __________ was the first operating system to integrate security as its core functions.
a. UNIX b. DOS
c. MULTICS d. ARPANET
ANSWER: c
39. __________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization
from unauthorized access and misuse.
a. Physical b. Personal
c. Object d. Standard
ANSWER: a
40. A server would experience a __________ attack when a hacker compromises it to acquire information from it from a
remote location using a network connection.
a. indirect b. direct
c. software d. hardware
ANSWER: b
41. A computer is the __________ of an attack when it is used to conduct an attack against another computer.
a. subject b. object
c. target d. facilitator
ANSWER: a
43. In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single
number called the __________ value.
a. result b. smashing
c. hash d. code
ANSWER: c
44. __________ has become a widely accepted evaluation standard for training and education related to the security of
information systems.
a. NIST SP 800-12 b. NSTISSI No. 4011
c. IEEE 802.11(g) d. ISO 17788
ANSWER: b
45. An information system is the entire set of __________, people, procedures, and networks that make possible the use of
information resources in the organization.
a. software b. hardware
c. data d. All of the above
ANSWER: d
46. A methodology for the design and implementation of an information system that is a formal development strategy is
referred to as a __________.
a. systems design b. development life project
Cengage Learning Testing, Powered by Cognero Page 5
Name: Class: Date:
47. A variation of n SDLC that can be used to implement information security solutions in an organizations with little or
no formal security in place is the __________.
a. SecDSLC b. SecSDLC
c. LCSecD d. CLSecD
ANSWER: b
48. A type of SDLC where each phase has results that flow into the next phase is called the __________ model.
a. pitfall b. SA&D
c. waterfall d. Method 7
ANSWER: c
49. During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in
the prior phases.
a. investigation b. implementation
c. analysis d. physical design
ANSWER: d
50. Which of the following phases is often considered the longest and most expensive phase of the systems development
life cycle?
a. investigation b. logical design
c. implementation d. maintenance and change
ANSWER: d
51. Organizations are moving toward more __________-focused development approaches, seeking to improve not only
the functionality of the systems they have in place, but consumer confidence in their product.
a. security b. reliability
c. accessibility d. availability
ANSWER: a
52. Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what
immediate steps are taken when an attack occurs.
a. Continuity planning b. Incident response
c. Disaster recovery d. Security response
ANSWER: b
53. The ____ is the individual primarily responsible for the assessment, management, and implementation of information
security in the organization.
a. ISO b. CIO
c. CISO d. CTO
ANSWER: c
54. Which of the following is a valid type of role when it comes to data ownership?
a. Data owners b. Data custodians
Cengage Learning Testing, Powered by Cognero Page 6
Name: Class: Date:
55. People with the primary responsibility for administering the systems that house the information used by the
organization perform the ____ role.
a. Security policy developers b. Security professionals
c. System administrators d. End users
ANSWER: c
Completion
56. The history of information security begins with the concept of ____________________ security.
ANSWER: computer
57. During the early years, information security was a straightforward process composed predominantly of
____________________ security and simple document classification schemes.
ANSWER: physical
58. During the ____________________ War, many mainframes were brought online to accomplish more complex and
sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than
mailing magnetic tapes between computer centers.
ANSWER: Cold
59. The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-
connected local area network.
ANSWER: connectivity
60. The CNSS model of information security evolved from a concept developed by the computer security industry known
as the ____________________ triangle.
ANSWER: CIA
C.I.A.
Confidentiality, Integrity, and Availability
61. A computer is the ____________________ of an attack when it is the entity being targeted.
ANSWER: object
62. ____________________ enables authorized users — persons or computer systems — to access information without
interference or obstruction and to receive it in the required format.
ANSWER: Availability
63. ____________________ of information is the quality or state of being genuine or original, rather than a reproduction
or fabrication.
ANSWER: Authenticity
65. In an organization, the value of ____________________ of information is especially high when it involves personal
Cengage Learning Testing, Powered by Cognero Page 7
Name: Class: Date:
66. The ____________________ of information is the quality or state of ownership or control of some object or item.
ANSWER: possession
67. The ____________________ component of the IS comprises applications, operating systems, and assorted command
utilities.
ANSWER: software
68. Software is often created under the constraints of ____________________ management, placing limits on time, cost,
and manpower.
ANSWER: project
69. A frequently overlooked component of an information system, ____________________ are the written instructions
for accomplishing a specific task.
ANSWER: procedures
70. In the ____________________ approach, the project is initiated by upper-level managers who issue policy,
procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
ANSWER: top-down
71. A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of
procedures.
ANSWER: methodology
72. The ____________________ phase consists primarily of assessments of the organization, its current systems, and its
capability to support the proposed systems.
ANSWER: analysis
73. A(n) ____________________ information security policy outlines the implementation of a security program within
the organization.
ANSWER: enterprise
74. The senior technology officer is typically the chief ____________________ officer.
ANSWER: information
75. A(n) ____________________ is a group of individuals who are united by similar interests or values within an
organization and who share a common goal of helping the organization to meet its objectives.
ANSWER: community of interest
Essay
76. Describe the multiple types of security systems present in many organizations.
ANSWER: A successful organization should have the following multiple layers of security in place to protect its
operations, including physical, personnel, operations, communications, network, and information.
Physical security, to protect physical items, objects, or areas from unauthorized access and misuse
Personnel security, to protect the individual or group of individuals who are authorized to access the
organization and its operations
Operations security, to protect the details of a particular operation or series of activities
Communications security, to protect communications media, technology, and content
Network security, to protect networking components, connections, and contents
Information security, to protect the confidentiality, integrity and availability of information assets, whether in
storage, processing or transmission. It is achieved via the application of policy, education, training and
awareness, and technology.
77. List and describe the six phases of the security systems development life cycle.
ANSWER: Investigation
The investigation phase of the SecSDLC begins with a directive from upper management, dictating the
process, outcomes, and goals of the project, as well as its budget and other constraints. Frequently, this phase
begins with an enterprise information security policy, which outlines the implementation of a security
program within the organization. Teams of responsible managers, employees, and contractors are organized;
problems are analyzed; and the scope of the project, as well as specific goals and objectives, and any
additional constraints not covered in the program policy, are defined. Finally, an organizational feasibility
analysis is performed to determine whether the organization has the resources and commitment necessary to
conduct a successful security analysis and design.
Analysis
In the analysis phase, the documents from the investigation phase are studied. The development team conducts
a preliminary analysis of existing security policies or programs, along with that of documented current threats
and associated controls. This phase also includes an analysis of relevant legal issues that could affect the
design of the security solution. Increasingly, privacy laws have become a major consideration when making
decisions about information systems that manage personal information. Recently, many states have
implemented legislation making certain computer-related activities illegal. A detailed understanding of these
issues is vital. The risk management task also begins in this stage. Risk management is the process of
identifying, assessing, and evaluating the levels of risk facing the organization, specifically the threats to the
organization’s security and to the information stored and processed by the organization.
Logical Design
The logical design phase creates and develops the blueprints for information security, and examines and
implements key policies that influence later decisions. Also at this stage, the team plans the incident response
actions to be taken in the event of partial or catastrophic loss. The planning answers the following questions:
- Continuity planning: How will business continue in the event of a loss?
- Incident response:What steps are taken when an attack occurs?
- Disaster recovery:What must be done to recover information and vital systems immediately after a disastrous
event?
Next, a feasibility analysis determines whether or not the project should be continued or be outsourced.
Physical Design
In the physical design phase, the information security technology needed to support the blueprint outlined in
the logical design is evaluated, alternative solutions generated, and a final design agreed upon. The
information security blueprint may be revisited to keep it in line with the changes needed when the physical
design is completed. Criteria for determining the definition of successful solutions are also prepared during
this phase. Included at this time are the designs for physical security measures to support the proposed
technological solutions. At the end of this phase, a feasibility study should determine the readiness of the
Cengage Learning Testing, Powered by Cognero Page 9
Name: Class: Date:
organization for the proposed project, and then the champion and sponsors are presented with the design. At
this time, all parties involved have a chance to approve the project before implementation begins.
Implementation
The implementation phase in of SecSDLC is also similar to that of the traditional SDLC. The security
solutions are acquired (made or bought), tested, implemented, and tested again. Personnel issues are evaluated,
and specific training and education programs conducted. Finally, the entire tested package is presented to
upper management for final approval.
Data custodians: Working directly with data owners, data custodians are responsible for the storage,
maintenance, and protection of the information. The duties of a data custodian often include overseeing data
storage and backups, implementing the specific procedures and policies laid out in the security policies and
plans, and reporting to the data owner.
Data users: End users who work with the information to perform their daily jobs supporting the mission of the
organization. Data users are included as individuals with an information security role.