Module 6 Flashcards
T/F
Operating System plays a key role in computer system security.
True
T/F
Any vulnerability at the operating system level opens the entire system to attack
True
T/F
The more complex and powerful the operating system, the more likely it is to have no vulnerabilities to attack
False
___ must be on guard to arm their operating systems with all available defenses against attack
System administrators
Capability of a system to do its mission in the presence of attacks, failures, or accidents
System Survivability
What key property is:
Strategies for repelling attacks
Resistance to attacks
What key property is:
Strategies for detecting attacks and evaluating damage
Recognition of attacks and damage
What key property is:
Strategies for limiting damage, restoring information or functionality, maintaining or restoring essential services
Recovery of essential and full services after attack
What key property is:
Strategies improving system survivability based on knowledge from prior intrusions
Adaptation and evolution to reduce effectiveness of future attacks
Vulnerabilities of Single computer (without e-mail or Internet)
Passwords, viruses
Vulnerabilities of LAN connected (without Internet)
Sniffers, spoofing (+passwords, viruses)
Vulnerabilities of LAN connected (with Internet)
E-mail, Web servers, FTP, Telnet (+sniffers, spoofing, passwords, viruses)
T/F
Backup and recovery are essential for most computing systems.
True
Many system managers use a ____.
Layered Backup Schedule
T/F
Backups stored on-site are crucial to disaster recovery
False (Off-site dapat para efas)