Create an account
Risk identification is performed within a larger process of identifying and justifying risk controls, which is called ___.
The second major undertaking involved in risk management, after risk identification, is___.
For information security purposes, ___ are the systems that use, store, and transmit information.
The ___ community of interest should have the best understanding of threats and attacks and often takes a leadership role in addressing risks.
The ___ community of interest must assist in risk management by configuring and operating information systems in a secure fashion.
The ___ community of interest must ensure sufficient resources are allocated to the risk management process.
Risk management strategy calls on information security professionals to know their organization's ___.
applications, operating systems, security components
The traditional system component of software can be broken into three components when viewed from an information security perspective: ___, ___, and ___.
intranet components and internet or dmz components
Hardware networking components can be broken down into two subgroups when viewed from an information security perspective: ___ and ___.
media access control (MAC) address
All network devices are assigned a unique number by the hardware at the network interface layer called the ___.
field change order (FCO)
The repair, modification, or update of a piece of equipment, usually made at the customer's premises, is called a ___.
weighted factor analysis
___ is the process of assigning scores for critical factors, each of which is weighted in importance by the organization.
list assets in order of their importance to the organization
The purpose of a weighted factor analysis is to ___.
data classification schemes
In order to ensure effort is spent protecting information that needs protecting, organizations implement ___.
When individuals are assigned security labels for access to categories of information, they have acquired ___.
The process of examining how each threat will affect an organization is called a ___.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together