Computer Security Quiz 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Confidentiality

The concealment of information or resources to protect sensitive data.

2
New cards

Need to know principle

A military-driven concept that restricts access to information based on necessity.

3
New cards

Cryptographic key

A tool that controls access to unscrambled data, requiring protection itself.

4
New cards

Resource hiding

The practice of concealing system configurations and specific equipment to prevent unauthorized use.

5
New cards

Access control mechanisms

Tools that enforce restrictions on who can access certain data or resources.

6
New cards

Integrity

The trustworthiness of data, ensuring it has not been improperly altered.

7
New cards

Data integrity

The accuracy and consistency of the content of information.

8
New cards

Origin integrity

The verification of the source of data, often referred to as authentication.

9
New cards

Prevention mechanisms

Tools designed to stop unauthorized changes to data.

10
New cards

Detection mechanisms

Tools that report when data integrity has been compromised.

11
New cards

Availability

The ability to access and use information or resources when needed.

12
New cards

Denial of service attacks

Attempts to block access to resources, making systems unavailable.

13
New cards

Threat

A potential violation of security that may or may not occur.

14
New cards

Attacks

Actions taken to exploit vulnerabilities and cause security violations.

15
New cards

Disclosure

Unauthorized access to information.

16
New cards

Deception

Acceptance of false data or impersonation of entities.

17
New cards

Disruption

Interruption or prevention of correct operation of a system.

18
New cards

Usurpation

Unauthorized control over a part of a system.

19
New cards

Snooping

Unauthorized interception of information.

20
New cards

Active wiretapping

Altering data in transit across a network.

21
New cards

Masquerading

Impersonation of one entity by another to deceive.

22
New cards

Delegation

Authorization of one entity to act on behalf of another.

23
New cards

Repudiation of origin

False denial that an entity sent or created something.

24
New cards

Delay

Temporary inhibition of service, often used in conjunction with deception.

25
New cards

Security policy

A statement defining what is allowed and what is not in a security context.

26
New cards

Security mechanism

Methods or tools used to enforce a security policy.

27
New cards

Prevention

Measures taken to ensure an attack fails.

28
New cards

Detection

Identifying when an attack is occurring or has occurred.

29
New cards

Recovery

Actions taken to restore systems after an attack.

30
New cards

Assurance

The trust in the effectiveness of security mechanisms.

31
New cards

Specification

A formal or informal statement of how a system should function.

32
New cards

Testing

A verification technique to ensure a program performs as specified.

33
New cards

Risk

The potential for loss or damage in a given environment.

34
New cards

Outsiders

Unauthorized individuals who pose a threat to an organization.

35
New cards

Insiders

Authorized individuals who may misuse their access to systems.

36
New cards

Social engineering

Manipulating individuals into divulging confidential information.

37
New cards

Detection mechanisms

Tools that analyze system events or data to identify security issues.

38
New cards

Back door

An exception in security rules that allows bypassing security mechanisms.

39
New cards

Trust

The belief in the reliability of security mechanisms and systems.

40
New cards

Security manager challenges

Issues faced in finding trained personnel in computer security.