Podcast
Questions and Answers
Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.
Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.
wrong
An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
consequence
An attack initiated by an entity inside the security perimeter is called an ______ attack.
An attack initiated by an entity inside the security perimeter is called an ______ attack.
inside
A threat represents a potential security harm to an ______.
A threat represents a potential security harm to an ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______
Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
A countermeasure is any means taken to deal with a security ______
A countermeasure is any means taken to deal with a security ______
An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
A threat represents a potential security harm to an ______.
A threat represents a potential security harm to an ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______
An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______
Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______
Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______
Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Flashcards are hidden until you start studying