Podcast
Questions and Answers
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______
ACCESS
The organizational resource that is being protected.- ______
The organizational resource that is being protected.- ______
ASSET
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______
ATTACK
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______
Signup and view all the answers
Technique used to compromise a system.- ______
Technique used to compromise a system.- ______
Signup and view all the answers
A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______
A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______
Signup and view all the answers
Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.
Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.
Signup and view all the answers
IT SECURITY - is information security applied to ______ (most often some form of computer system).
IT SECURITY - is information security applied to ______ (most often some form of computer system).
Signup and view all the answers
INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.
INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.
Signup and view all the answers
Information security entails a sense of assurance that information risks and controls are ______.
Information security entails a sense of assurance that information risks and controls are ______.
Signup and view all the answers
HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.
HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.
Signup and view all the answers
ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.
ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.
Signup and view all the answers