Computer Security and Protection Basics
5 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Protection and security requires that ______ resources such as CPU, software, and memory are protected against unauthorized access, viruses, worms etc. This can be done by ensuring integrity, confidentiality and availability in the operating system. Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

computer

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of ______ is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to ______. It is a circumstance where an unauthorized entity gains access to data.

confidentiality

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, ______ is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

availability

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the ______ but does not affect ______ resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter ______ resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

<p>system</p> Signup and view all the answers

Integrity - Guarding against improper ______ modification or destruction, including ensuring ______ nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on ______ access and disclosure. A loss of confidentiality is the unauthorized ______ disclosure. Availability - Ensuring timely and reliable access to and use of ______. When access to or use of ______ is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the ______ from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

<p>information</p> Signup and view all the answers

More Like This

Operating System Security
18 questions
Operating System Security Hardening
15 questions
Computer Security Chapter 12
7 questions
Use Quizgecko on...
Browser
Browser