Front | Back |
Information has ______ when it is whole, complete, and uncorrupted. | Integrity |
In an organization, the value of _________ of information is especially high when it involves personal information about employees, customers, or patients. | Confidentiality |
A computer is the _______ of an attack when it is the target entity. | Object |
In the ___ _____ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action. | Top-down |
During the ____ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. | Cold |
The ______ component of the IS comprises applications, operating systems, and assorted command utilities. | Software |
The senior technology officer is typically the chief ______ officer. | Information |
A frequently overlooked component of an IS, _____ are written instructions for accomplishing a specific task. | Procedures |
The CNSS model of information security evolved from a concept developed by the computer security industry known as the _____ triangle. | CIA |
A(n) _______ information security policy outlines the implementation of a security program within the organization. | Enterprise |
A(n) ________ is a formal approach to solving a problem by means of a structured sequence of procedures. | Methodology |
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ______ . | Network |
The ______ of information is the quality or state of ownership or control of some object or item. | Possession |
________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. | Authenticity |
_________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format. | Availability |
Get answer to your question and much more
PTS:1REF:129.Information has ____________________ when it is whole, complete, and uncorrupted.
Get answer to your question and much more
PTS:1REF:1310.In an organization, the value of ____________________ of information is especially high when itinvolves personal information about employees, customers, or patients.
Get answer to your question and much more
PTS:1REF:1311.The ____________________ of information is the quality or state of ownership or control of someobject or item.
Get answer to your question and much more
PTS:1REF:1512.The ____________________ component of the IS comprises applications, operating systems, andassorted command utilities.
Get answer to your question and much more
PTS:1REF:1613.____________________ carries the lifeblood of information through an organization.
Get answer to your question and much more
PTS:1REF:1614.A frequently overlooked component of an IS, ____________________ are written instructions foraccomplishing a specific task.
Get answer to your question and much more
PTS:1REF:1815.In the ____________________ approach, the project is initiated by upper-level managers who issuepolicy, procedures and processes, dictate the goals and expected outcomes, and determineaccountability for each required action.
Get answer to your question and much more