Methods of Defense in Computer Security

ThrillingValley8970 avatar
ThrillingValley8970
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What does encryption do to data?

Make it unintelligible to the outside observer

Which of the following is NOT a program control measure mentioned in the text?

Hardware controls

What is the purpose of software controls in computer security?

To exclude outside attacks and ensure program dependability

What type of controls enforce security restrictions like access limitations in a database management system?

Internal program controls

Which of these is NOT a hardware control measure mentioned in the text?

Increasing data integrity

What aspect of computer security does encryption primarily address?

Confidentiality

What does computer security aim to protect?

The confidentiality, integrity, and availability of information system resources

Which of the following is NOT one of the basic security goals?

Authenticity

What is the main purpose of confidentiality in computer security?

To keep information secret and concealed

Which of the following is NOT an example of sensitive information that requires confidentiality?

Publicly available information

What does integrity refer to in computer security?

The trustworthiness of data or resources

Which aspect of computer security ensures the ability to use the information or resource?

Availability

What is the main purpose of cryptography in computer networks?

Making data unreadable to attackers

Which hardware control is used to protect the system as a whole?

Firewalls

What type of control enforces quality measures on the original source code?

Development controls

Which control is responsible for authenticating users with digital signatures?

Fingerprint readers

What is the purpose of personal firewalls that run on your desktop?

Protecting against unauthorized network access

Which physical control is used to protect hardware itself and physical access to devices?

Locks

This quiz covers different methods of defense, countermeasures, and best security practices to prevent exploitation of vulnerabilities in computing systems. Topics include encryption, policies and procedures, non-technical means of protection, and rules about changing passwords.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Security Basics
15 questions
Computer Security
2 questions

Computer Security

ProperOrangutan59 avatar
ProperOrangutan59
Use Quizgecko on...
Browser
Browser