Chapter 16: Protection and Security Flashcards

1
Q

Computer security is

A

the freedom from theft of or damage to hardware, software, or information, and from disruption or misdirection of services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection is

A

the set of mechanisms and policies that guarantee computer security, including the confidentiality, integrity, availability, and authenticity of all data and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information disclosure

A

An unauthorized release or dissemination of information, which may be the result of theft or the deliberate release of the information by an authorized user. Violation of confidentiality and/or privacy of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information modification

A

An unauthorized modification of data or programs, which may be performed by a legitimate user or by an intruder. Loss of information and/or the ability to carry out subsequent security violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information destruction

A

A deliberate or accidental deletion of information or damage to hardware. Loss of information or access to services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized use

A

A circumvention of the system’s user authentication services to make unauthorized use of a service. Loss of revenue to the service provider/owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service

A

Preventing a legitimate user from employing a service in a timely manner. Financial loss, unavailability of a mission-critical or life-critical system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User deception

A

Causing a legitimate user to receive and believe false information purported to be true. Loss of information, leading to other possible violations of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus vs Worm

A

Viruses rely on host files, require user interaction, and focus on specific systems, while worms are self-replicating, exploit network vulnerabilities, and have the potential for widespread impact. Both malware types require appropriate security measures and practices to prevent infection and mitigate their risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A one-way hash function converts

A

a variable-length input string into a fixed-length output string in a manner that cannot be inverted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly