Computer Security and Protection Basics

WellBalancedMorganite avatar
WellBalancedMorganite
·
·
Download

Start Quiz

Study Flashcards

5 Questions

Protection and security requires that ______ resources such as CPU, software, and memory are protected against unauthorized access, viruses, worms etc. This can be done by ensuring integrity, confidentiality and availability in the operating system. Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

computer

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of ______ is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to ______. It is a circumstance where an unauthorized entity gains access to data.

confidentiality

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, ______ is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

availability

Integrity - Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on information access and disclosure. A loss of confidentiality is the unauthorized information disclosure. Availability - Ensuring timely and reliable access to and use of information. When access to or use of information is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the information from the ______ but does not affect ______ resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter ______ resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

system

Integrity - Guarding against improper ______ modification or destruction, including ensuring ______ nonrepudiation and authenticity. When unauthorized modification and destruction of data occurs, integrity is lost. Confidentiality - Preserving authorized restrictions on ______ access and disclosure. A loss of confidentiality is the unauthorized ______ disclosure. Availability - Ensuring timely and reliable access to and use of ______. When access to or use of ______ is disrupted, availability is lost. What Needs To Be Protected. Threats and Attacks Passive Attacks vs. Active Attacks Passive attacks - attempt to learn or make use of the ______ from the system but does not affect system resources. They are very difficult to detect because they don’t involve alteration of data. Active attacks - attempt to alter system resources or affect their operation. They involve some alteration on the data stream or the creation of a false stream. Unauthorized Disclosure – Threat to confidentiality. It is a circumstance where an unauthorized entity gains access to data.

information

Test your knowledge of computer security and protection with this quiz covering the basics of security requirements, integrity, confidentiality, and availability in the operating system.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Operating System Functions Quiz
10 questions

Operating System Functions Quiz

WellBredImpressionism avatar
WellBredImpressionism
Operating System Components
30 questions

Operating System Components

GodlikeRhodochrosite avatar
GodlikeRhodochrosite
Operating System Security Hardening
15 questions
Use Quizgecko on...
Browser
Browser