Computer Security Quiz 1

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Confidentiality

1 / 39

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

40 Terms

1

Confidentiality

The concealment of information or resources to protect sensitive data.

New cards
2

Need to know principle

A military-driven concept that restricts access to information based on necessity.

New cards
3

Cryptographic key

A tool that controls access to unscrambled data, requiring protection itself.

New cards
4

Resource hiding

The practice of concealing system configurations and specific equipment to prevent unauthorized use.

New cards
5

Access control mechanisms

Tools that enforce restrictions on who can access certain data or resources.

New cards
6

Integrity

The trustworthiness of data, ensuring it has not been improperly altered.

New cards
7

Data integrity

The accuracy and consistency of the content of information.

New cards
8

Origin integrity

The verification of the source of data, often referred to as authentication.

New cards
9

Prevention mechanisms

Tools designed to stop unauthorized changes to data.

New cards
10

Detection mechanisms

Tools that report when data integrity has been compromised.

New cards
11

Availability

The ability to access and use information or resources when needed.

New cards
12

Denial of service attacks

Attempts to block access to resources, making systems unavailable.

New cards
13

Threat

A potential violation of security that may or may not occur.

New cards
14

Attacks

Actions taken to exploit vulnerabilities and cause security violations.

New cards
15

Disclosure

Unauthorized access to information.

New cards
16

Deception

Acceptance of false data or impersonation of entities.

New cards
17

Disruption

Interruption or prevention of correct operation of a system.

New cards
18

Usurpation

Unauthorized control over a part of a system.

New cards
19

Snooping

Unauthorized interception of information.

New cards
20

Active wiretapping

Altering data in transit across a network.

New cards
21

Masquerading

Impersonation of one entity by another to deceive.

New cards
22

Delegation

Authorization of one entity to act on behalf of another.

New cards
23

Repudiation of origin

False denial that an entity sent or created something.

New cards
24

Delay

Temporary inhibition of service, often used in conjunction with deception.

New cards
25

Security policy

A statement defining what is allowed and what is not in a security context.

New cards
26

Security mechanism

Methods or tools used to enforce a security policy.

New cards
27

Prevention

Measures taken to ensure an attack fails.

New cards
28

Detection

Identifying when an attack is occurring or has occurred.

New cards
29

Recovery

Actions taken to restore systems after an attack.

New cards
30

Assurance

The trust in the effectiveness of security mechanisms.

New cards
31

Specification

A formal or informal statement of how a system should function.

New cards
32

Testing

A verification technique to ensure a program performs as specified.

New cards
33

Risk

The potential for loss or damage in a given environment.

New cards
34

Outsiders

Unauthorized individuals who pose a threat to an organization.

New cards
35

Insiders

Authorized individuals who may misuse their access to systems.

New cards
36

Social engineering

Manipulating individuals into divulging confidential information.

New cards
37

Detection mechanisms

Tools that analyze system events or data to identify security issues.

New cards
38

Back door

An exception in security rules that allows bypassing security mechanisms.

New cards
39

Trust

The belief in the reliability of security mechanisms and systems.

New cards
40

Security manager challenges

Issues faced in finding trained personnel in computer security.

New cards

Explore top notes

note Note
studied byStudied by 36 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(2)
note Note
studied byStudied by 57 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
5.0(3)
note Note
studied byStudied by 19 people
... ago
5.0(2)
note Note
studied byStudied by 136 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (51)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 32 people
... ago
5.0(2)
flashcards Flashcard (51)
studied byStudied by 45 people
... ago
4.5(6)
flashcards Flashcard (70)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 94 people
... ago
5.0(2)
robot