20 Questions
Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.
wrong
An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
consequence
An attack initiated by an entity inside the security perimeter is called an ______ attack.
inside
A threat represents a potential security harm to an ______.
asset
Someone who should not have access to some or all of the information available through the network obtains such ______.
access
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
authorization
Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______
governments
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Risk
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
service
A countermeasure is any means taken to deal with a security ______
attack
An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
threat, consequence
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
authorization
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
risk
A threat represents a potential security harm to an ______.
asset
Someone who should not have access to some or all of the information available through the network obtains such ______.
access
An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______
attack
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______
assets
Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______
attack
Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
service
An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
authorization
Test your knowledge of computer system and network security vulnerabilities, including concepts and relationships related to system resources and their vulnerabilities. Explore the general categories of vulnerabilities and understand how they can impact the security of a computer system or network asset.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free