Computer Security Fundamentals

DecisivePipa avatar
DecisivePipa
·

Start Quiz

Study Flashcards

16 Questions

Computer security aims to protect computer assets from unauthorized access, use, alteration, degradation, and other ______

Computer systems should have a set of protection policies to restrict and control the system ______

Data confidentiality is concerned with keeping secret data ______

Unauthorized users should not be able to modify any data without the owner's ______

System availability means nobody can disturb the system to make it ______

Computer security is required because computer systems are vulnerable to many threats that can inflict various types of ______

This damage can range from errors harming database integrity to fires destroying entire computer centers. There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal data. Loss of sensitive information to hostile parties. Use of sensitive information to steal items of monetary value. Use of sensitive information against the organization's customers, which may result in legal action by customers against the organization and loss of customers. Damage to the reputation of an organization. Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's reputation.  Losing the ability to use the system ______ Threats A threat is a potential violation of security. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. A computer security threat can be any person, act, or object that poses a danger to computer security. Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, sabotage, accidents. Software threats - viruses, Trojan horses, logic bombs, denial of service, trap door.

A threat is a potential violation of ______. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.

A computer ______ threat can be any person, act, or object that poses a danger to computer security.

Generally, environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, ______, accidents.

There may be several forms of damage, which are obviously interrelated. These include: Damage or destruction of computer systems. Damage or destruction of internal ______.

Loss of sensitive information to ______ parties.

Use of sensitive information to steal items of ______ value.

Damage to the reputation of an ______.

Monetary damage due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the organization's ______.

A computer security threat can be any person, act, or object that poses a danger to computer ______.

Description

Test your knowledge of computer security fundamentals including prevention, protection, policies, and security goals like data confidentiality and integrity. Explore concepts related to unauthorized access, malicious modification, destruction, and accidental introduction of inconsistencies.

Make Your Own Quiz

Transform your notes into a shareable quiz, with AI.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser