Computer Security Fundamentals

DecisivePipa avatar
DecisivePipa
·
·
Download

Start Quiz

Study Flashcards

16 Questions

Computer security aims to protect computer assets from unauthorized access, use, alteration, degradation, and other ______

threats

Computer systems should have a set of protection policies to restrict and control the system ______

resources

Data confidentiality is concerned with keeping secret data ______

secret

Unauthorized users should not be able to modify any data without the owner's ______

permission

System availability means nobody can disturb the system to make it ______

unusable

Computer security is required because computer systems are vulnerable to many threats that can inflict various types of ______

damage

This damage can range from errors harming database integrity to fires destroying entire computer centers. There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal data. Loss of sensitive information to hostile parties. Use of sensitive information to steal items of monetary value. Use of sensitive information against the organization's customers, which may result in legal action by customers against the organization and loss of customers. Damage to the reputation of an organization. Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation.  Losing the ability to use the system ______ Threats A threat is a potential violation of security. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. A computer security threat can be any person, act, or object that poses a danger to computer security. Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, sabotage, accidents. Software threats - viruses, Trojan horses, logic bombs, denial of service, trap door.

Security

A threat is a potential violation of ______. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.

security

A computer ______ threat can be any person, act, or object that poses a danger to computer security.

security

Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, ______, accidents.

sabotage

There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal ______.

data

Loss of sensitive information to ______ parties.

hostile

Use of sensitive information to steal items of ______ value.

monetary

Damage to the reputation of an ______.

organization

Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's ______.

reputation

A computer security threat can be any person, act, or object that poses a danger to computer ______.

security

Study Notes

Computer Security Threats

  • Computer security aims to protect computer assets from unauthorized access, use, alteration, degradation, and other malicious acts.
  • Computer systems should have a set of protection policies to restrict and control system access.

Data Confidentiality and Protection

  • Data confidentiality is concerned with keeping secret data confidential.
  • Unauthorized users should not be able to modify any data without the owner's permission.

System Availability

  • System availability means nobody can disturb the system to make it unavailable.

Importance of Computer Security

  • Computer security is required because computer systems are vulnerable to many threats that can inflict various types of damage.
  • Threats can cause damage, including errors harming database integrity to fires destroying entire computer centers.

Types of Damage

  • Damage or destruction of computer systems.
  • Damage or destruction of internal data.
  • Loss of sensitive information to hostile parties.
  • Use of sensitive information to steal items of monetary value.
  • Use of sensitive information against the organization's customers, which may result in legal action by customers against the organization and loss of customers.
  • Damage to the reputation of an organization.
  • Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation.
  • Losing the ability to use the system.

Threats to Computer Security

  • A threat is a potential violation of security.
  • Computer security threats can be physical, human, or software-based.
  • Physical threats include weather, natural disaster, bombs, power failures, etc.
  • Human threats include stealing, trickery, bribery, spying, sabotage, accidents.
  • Software threats include viruses, Trojan horses, logic bombs, denial of service, trap doors.

Test your knowledge of computer security fundamentals including prevention, protection, policies, and security goals like data confidentiality and integrity. Explore concepts related to unauthorized access, malicious modification, destruction, and accidental introduction of inconsistencies.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser