Computer Security Concepts

CompliantAlder avatar
CompliantAlder
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the ability to protect or defend the use of cyberspace from cyberattacks?

Cybersecurity

What is the primary objective of confidentiality in computer security?

To protect data from unauthorized access

What is the process of verifying the identity or other attributes claimed by or assumed of an entity?

Authentication

What is the granting of rights, which includes the granting of access based on access rights?

Authorization

What is the possibility that a particular threat will adversely impact an information system?

Risk

What is the ability to make use of any information system resource?

Access

What does integrity ensure in computer security?

That confidential information is not disclosed to unauthorized individuals

What is the purpose of risk assessment in computer security?

To assure that systems work promptly and service is not denied to authorized users

What is computer security often viewed as?

An impediment to efficient and user-friendly operation of an information system

What are threats in computer security?

Ways to exploit vulnerabilities in computer systems

What is the principle of isolation?

To isolate public access from critical resources

What is an attack tree in computer security?

A hierarchical data structure that represents a set of potential vulnerabilities

Which security concept refers to the protection of sensitive information from unauthorized access?

Confidentiality

What is the primary goal of risk assessment in computer security?

To identify and mitigate vulnerabilities

What is the purpose of security policies in a computer security strategy?

To define and enforce security rules and procedures

What is the term for the process of identifying and mitigating vulnerabilities in a computer system?

Vulnerability management

What is the purpose of an attack tree in computer security?

To guide the design and strengthen countermeasures

What is the term for the reachable and exploitable vulnerabilities in a computer system?

Attack surfaces

Quiz on various computer security concepts including confidentiality, integrity, authenticity, and risk management.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser