Podcast
Questions and Answers
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.- ______
ACCESS
The organizational resource that is being protected.- ______
The organizational resource that is being protected.- ______
ASSET
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______
An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it.- ______
ATTACK
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.- ______
Technique used to compromise a system.- ______
Technique used to compromise a system.- ______
A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______
A weakness or fault in a system or protection mechanism that opens it to attack or damage.- ______
Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.
Julius Caesar is credited with the invention of the Caesar cipher c. 50 B.C., which was created to prevent his secret messages from being read should a message fall into the wrong ______.
IT SECURITY - is information security applied to ______ (most often some form of computer system).
IT SECURITY - is information security applied to ______ (most often some form of computer system).
INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.
INFORMATION ASSURANCE - act of ensuring that data is not lost when critical ______ arise.
Information security entails a sense of assurance that information risks and controls are ______.
Information security entails a sense of assurance that information risks and controls are ______.
HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.
HISTORY OF INFORMATION SECURITY - Computer security began immediately after the first ______ were developed.
ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.
ENIGMA - The Enigma machine was a cipher device used for encryption and decryption during World War II.It employed a series of rotating rotors to substitute letters, creating complex ciphered messages.Keywords: cipher device, encryption, decryption, rotating rotors, World War II.- Used by the German military during World War II for secure ______.