Unauthorized Data Retrieval and Types of Security Attacks Quiz
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Encryption services can protect your data at rest or in transit and prevent unauthorized access to protected data. Goals of security integrity include the consistency of data, networks, and systems, including mitigation and proactive measures to restrict unapproved changes, while also having the ability to recover data that has been lost or compromised. Assurance that data have not been altered or destroyed, e.g., detection on any modification of data by ______ parties.

unauthorized

Goals of security availability include providing continuous operations (uninterrupted services) of hardware and software to the authorized users. Only authorized users that can freely access the systems, networks, and data needed to perform their daily tasks. Resolving hardware and software conflicts, along with regular maintenance, is crucial to keep systems up and available. Who is ______?

Attacker

An ______ is any software or person that deliberately attempts to avoid security services and violate the security policy of the networked system. Such a person or computer program intentionally attempts to gain unauthorized access to information resources. They sometimes also prevent legitimate access to that resource. Such an unauthorized activity uses specially crafted codes or techniques and is called an attack.

Attacker

A ______ is a person who breaks into other people's computers with malicious intentions.

<p>Hacker</p> Signup and view all the answers

An unauthorized ______ uses specially crafted codes or techniques and is called an attack.

<p>activity</p> Signup and view all the answers

A person who breaks into other people's computers with malicious intentions is called a ______.

<p>Hacker</p> Signup and view all the answers

Goals of security integrity include assurance that data have not been altered or destroyed, e.g., detection on any modification of data by ______ parties.

<p>unauthorized</p> Signup and view all the answers

Only authorized users that can freely access the systems, networks, and data needed to perform their daily tasks. Resolving hardware and software conflicts, along with regular maintenance, is crucial to keep systems up and ______.

<p>available</p> Signup and view all the answers

An attacker is any software or person that deliberately attempts to avoid security services and violate the security policy of the networked system. Such a person or computer program intentionally attempts to gain ______ access to information resources.

<p>unauthorized</p> Signup and view all the answers

An attacker is any software or person that deliberately attempts to avoid security services and violate the security policy of the networked system. Such a person or computer program intentionally attempts to gain unauthorized access to information ______.

<p>resources</p> Signup and view all the answers

More Like This

Cyber Attacks Quiz
5 questions

Cyber Attacks Quiz

AmusingInsight avatar
AmusingInsight
Information Assurance Principles Quiz
25 questions

Information Assurance Principles Quiz

MarvelousIambicPentameter avatar
MarvelousIambicPentameter
Unauthorized Disclosure Overview
33 questions
Use Quizgecko on...
Browser
Browser