Podcast
Questions and Answers
Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.
Security concerns are with the vulnerabilities of system resources, such as it can be corrupted, so that it does the ______ thing or gives wrong answers.
wrong
An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
An attack is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
consequence
An attack initiated by an entity inside the security perimeter is called an ______ attack.
An attack initiated by an entity inside the security perimeter is called an ______ attack.
inside
A threat represents a potential security harm to an ______.
A threat represents a potential security harm to an ______.
Signup and view all the answers
Someone who should not have access to some or all of the information available through the network obtains such ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
Signup and view all the answers
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Signup and view all the answers
Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______
Outside attack: Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an 'outsider'). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile ______
Signup and view all the answers
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Signup and view all the answers
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
Signup and view all the answers
A countermeasure is any means taken to deal with a security ______
A countermeasure is any means taken to deal with a security ______
Signup and view all the answers
An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
An attack is a ______ that is carried out and, if successful, leads to an undesirable violation of security, or threat ______.
Signup and view all the answers
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
The insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Signup and view all the answers
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Vulnerabilities, Threat and Attack Threats +Vulnerability = ______
Signup and view all the answers
A threat represents a potential security harm to an ______.
A threat represents a potential security harm to an ______.
Signup and view all the answers
Someone who should not have access to some or all of the information available through the network obtains such ______.
Someone who should not have access to some or all of the information available through the network obtains such ______.
Signup and view all the answers
An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______
An active attack attempts to alter system resources or affect their operation. A useful means of classifying security attacks in terms of passive attacks and active attacks. Security Attacks will seek to minimize that risk given other constraints. A countermeasure is any means taken to deal with a security ______
Signup and view all the answers
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may remain after the imposition of countermeasures. Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the ______
Signup and view all the answers
Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______
Security mechanism: A process (or a device) that is designed to detect, prevent, or recover from a security ______
Signup and view all the answers
Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the ______
Signup and view all the answers
An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
An insider is authorized to access system resources but uses them in a way not approved by those who granted the ______
Signup and view all the answers