Computer System and Network Security Vulnerabilities

FeatureRichAutoharp avatar
FeatureRichAutoharp
·
·
Download

Start Quiz

Study Flashcards

20 Questions

Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.

wrong

An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.

consequence

An attack initiated by an entity inside the security perimeter is called an ______ attack.

inside

A threat represents a potential security harm to an ______.

asset

Someone who should not have access to some or all of the information available through the network obtains such ______.

access

The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

authorization

Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______

governments

Vulnerabilities, Threat and Attack Threats +Vulnerability = ______

Risk

A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______

service

A countermeasure is any means taken to deal with a security ______

attack

An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.

threat, consequence

The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

authorization

Vulnerabilities, Threat and Attack Threats +Vulnerability = ______

risk

A threat represents a potential security harm to an ______.

asset

Someone who should not have access to some or all of the information available through the network obtains such ______.

access

An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______

attack

A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______

assets

Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______

attack

Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______

service

An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______

authorization

Test your knowledge of computer system and network security vulnerabilities, including concepts and relationships related to system resources and their vulnerabilities. Explore the general categories of vulnerabilities and understand how they can impact the security of a computer system or network asset.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser