16 Questions
Computer security aims to protect computer assets from unauthorized access, use, alteration, degradation, and other ______
threats
Computer systems should have a set of protection policies to restrict and control the system ______
resources
Data confidentiality is concerned with keeping secret data ______
secret
Unauthorized users should not be able to modify any data without the owner's ______
permission
System availability means nobody can disturb the system to make it ______
unusable
Computer security is required because computer systems are vulnerable to many threats that can inflict various types of ______
damage
This damage can range from errors harming database integrity to fires destroying entire computer centers. There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal data. Loss of sensitive information to hostile parties. Use of sensitive information to steal items of monetary value. Use of sensitive information against the organization's customers, which may result in legal action by customers against the organization and loss of customers. Damage to the reputation of an organization. Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation. Losing the ability to use the system ______ Threats A threat is a potential violation of security. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. A computer security threat can be any person, act, or object that poses a danger to computer security. Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, sabotage, accidents. Software threats - viruses, Trojan horses, logic bombs, denial of service, trap door.
Security
A threat is a potential violation of ______. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
security
A computer ______ threat can be any person, act, or object that poses a danger to computer security.
security
Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, ______, accidents.
sabotage
There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal ______.
data
Loss of sensitive information to ______ parties.
hostile
Use of sensitive information to steal items of ______ value.
monetary
Damage to the reputation of an ______.
organization
Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's ______.
reputation
A computer security threat can be any person, act, or object that poses a danger to computer ______.
security
Study Notes
Computer Security Threats
- Computer security aims to protect computer assets from unauthorized access, use, alteration, degradation, and other malicious acts.
- Computer systems should have a set of protection policies to restrict and control system access.
Data Confidentiality and Protection
- Data confidentiality is concerned with keeping secret data confidential.
- Unauthorized users should not be able to modify any data without the owner's permission.
System Availability
- System availability means nobody can disturb the system to make it unavailable.
Importance of Computer Security
- Computer security is required because computer systems are vulnerable to many threats that can inflict various types of damage.
- Threats can cause damage, including errors harming database integrity to fires destroying entire computer centers.
Types of Damage
- Damage or destruction of computer systems.
- Damage or destruction of internal data.
- Loss of sensitive information to hostile parties.
- Use of sensitive information to steal items of monetary value.
- Use of sensitive information against the organization's customers, which may result in legal action by customers against the organization and loss of customers.
- Damage to the reputation of an organization.
- Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation.
- Losing the ability to use the system.
Threats to Computer Security
- A threat is a potential violation of security.
- Computer security threats can be physical, human, or software-based.
- Physical threats include weather, natural disaster, bombs, power failures, etc.
- Human threats include stealing, trickery, bribery, spying, sabotage, accidents.
- Software threats include viruses, Trojan horses, logic bombs, denial of service, trap doors.
Test your knowledge of computer security fundamentals including prevention, protection, policies, and security goals like data confidentiality and integrity. Explore concepts related to unauthorized access, malicious modification, destruction, and accidental introduction of inconsistencies.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free