Information assurance 1

Is a methodology for the design and implementation of an information system.
Is a formal approach in solving a problem by means of a structured sequence of procedures.
Enable you to determine the problem within the environment and identify the problem causes.
Begins with the information gained during the investigation phase. Also known as assessment phase
Specific technologies are selected to support the alternatives identified and evaluated in the logical design.
Is an act that takes advantage of vulnerability to compromise a controlled system.
Damages or steals an organization's information or physical asset
Is the kind of harmful computer code or web script designed to create system vulnerabilities.
2 types of Malicious Code
Determines the best solution to the specific problem found/identified in investigation phase.
0
{"name":"Information assurance 1", "url":"https://www.quiz-maker.com/QNMX65W4E","txt":"Is a methodology for the design and implementation of an information system., Is a formal approach in solving a problem by means of a structured sequence of procedures., Enable you to determine the problem within the environment and identify the problem causes.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker