Computer System and Network Security Vulnerabilities
20 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.

wrong

An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.

consequence

An attack initiated by an entity inside the security perimeter is called an ______ attack.

inside

A threat represents a potential security harm to an ______.

<p>asset</p> Signup and view all the answers

Someone who should not have access to some or all of the information available through the network obtains such ______.

<p>access</p> Signup and view all the answers

The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

<p>authorization</p> Signup and view all the answers

Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______

<p>governments</p> Signup and view all the answers

Vulnerabilities, Threat and Attack Threats +Vulnerability = ______

<p>Risk</p> Signup and view all the answers

A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______

<p>service</p> Signup and view all the answers

A countermeasure is any means taken to deal with a security ______

<p>attack</p> Signup and view all the answers

An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.

<p>threat, consequence</p> Signup and view all the answers

The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

<p>authorization</p> Signup and view all the answers

Vulnerabilities, Threat and Attack Threats +Vulnerability = ______

<p>risk</p> Signup and view all the answers

A threat represents a potential security harm to an ______.

<p>asset</p> Signup and view all the answers

Someone who should not have access to some or all of the information available through the network obtains such ______.

<p>access</p> Signup and view all the answers

An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______

<p>attack</p> Signup and view all the answers

A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______

<p>assets</p> Signup and view all the answers

Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______

<p>attack</p> Signup and view all the answers

Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______

<p>service</p> Signup and view all the answers

An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

<p>authorization</p> Signup and view all the answers

More Like This

Computer and Network Security
5 questions

Computer and Network Security

HeavenlyStarlitSky3474 avatar
HeavenlyStarlitSky3474
Computer and Network Security
5 questions

Computer and Network Security

HeavenlyStarlitSky3474 avatar
HeavenlyStarlitSky3474
IT Security Threats and Vulnerabilities
16 questions
Use Quizgecko on...
Browser
Browser