How can we help?

You can also find more resources in our Help Center.

Study sets matching "computer security chapter 1"

Study sets
Classes
Users

Study sets matching "computer security chapter 1"

10 terms
Computer Security Chapter 1
Unauthorized Disclosure
Exposure
Interception
Inference
A circumstance or event whereby an entity gains access to dat…
Sensitive data are directly released to an unauthorized entity
An unauthorized entity directly accesses sensitive data trave…
A threat action whereby an unauthorized entity indirectly acc…
Unauthorized Disclosure
A circumstance or event whereby an entity gains access to dat…
Exposure
Sensitive data are directly released to an unauthorized entity
51 terms
UCF Computer Security Chapter 1
Vulnerabilities
Attacks
C.I.A.
Confidentiality
can allow a malicious user to gain access to private data and…
enabled by vulnerabilities
confidentiality, integrity, availability
the avoidance of the unauthorized disclosure of information
Vulnerabilities
can allow a malicious user to gain access to private data and…
Attacks
enabled by vulnerabilities
39 terms
Computer Security Concepts Chapter 1
computer security
data confidentiality
privacy
data integrity
the protection a computer has in order to preserve integrity,…
assures that private information is not made available to una…
assures that individuals control what information related to…
assures that information and programs are changed only in a s…
computer security
the protection a computer has in order to preserve integrity,…
data confidentiality
assures that private information is not made available to una…
42 terms
Security in Computing - Chapter 1
computing system
principle of easiest penetration
hardware
software
a collection of hardware, software, storage media, data, and…
an intruder must be expected to use any available means of pe…
physical component of a computer based system
application component of a computer based system
computing system
a collection of hardware, software, storage media, data, and…
principle of easiest penetration
an intruder must be expected to use any available means of pe…
11 terms
Principles of Computer Security Chapter 1
critical infrastructure
elite hackers
hacking
hacktivist
Infrastructures whose loss would have a severe detrimental im…
the most technically competent individuas conducting intrusiv…
act of deliberately accessing computer systems and networks w…
A hacker whose activities are motivated my a personal cause o…
critical infrastructure
Infrastructures whose loss would have a severe detrimental im…
elite hackers
the most technically competent individuas conducting intrusiv…
32 terms
Computer Security Ch-1
•Definition of computer security
Three key objectives known as the CIA…
Confidentiality
Data Confidentiality
The protection afforded to an automated information system in…
Confidentiality, Integrity, Availability
Preserving authorized restriction on information access and d…
Assures that private or confidential information is not made…
•Definition of computer security
The protection afforded to an automated information system in…
Three key objectives known as the CIA…
Confidentiality, Integrity, Availability
24 terms
Computer Security Midterm CH 1
F
T
T
T
Threats are attacks carried out.... True or False
Computer security is protection of the integrity, availabilit…
Data integrity assures that information and programs are chan…
Availability assures that systems works promptly and service…
F
Threats are attacks carried out.... True or False
T
Computer security is protection of the integrity, availabilit…
10 terms
Chapter 1 Computer Security Principles and Practice (Stallings/Brown)
Computer Security
Data Confidentiality
Privacy
Data integrity
Three concepts at the heart of computer security our confiden…
Assures that private or confidential information is not made…
Assure that individuals control or influence what information…
Assures that information and programs are changed only in a s…
Computer Security
Three concepts at the heart of computer security our confiden…
Data Confidentiality
Assures that private or confidential information is not made…
40 terms
Chapter 1 - Computer Security and Safety, Ethics, and Privacy
adware
anti-spam program
antivirus program
back door
Program that displays an online advertisement in a banner or…
Program that attempts to remove spam before it reaches a user…
Program that protects a computer against viruses by identifyi…
Program or set of instructions in a program that allow users…
adware
Program that displays an online advertisement in a banner or…
anti-spam program
Program that attempts to remove spam before it reaches a user…
30 terms
Computer Security Ch 1.1
CIA Triad
Data Confidentiality
Privacy (Confidentiality)
Data Integrity
Group of 3 Security Objectives (Well Established)... - Confiden…
Assures that private information is not made available or dis…
Assures that individuals control or influence what informatio…
Assures that information and programs are changed only in a s…
CIA Triad
Group of 3 Security Objectives (Well Established)... - Confiden…
Data Confidentiality
Assures that private information is not made available or dis…
40 terms
Chapter 1 - Computer Security and Safety, Ethics, and Privacy
adware
anti-spam program
antivirus program
back door
Program that displays an online advertisement in a banner or…
Program that attempts to remove spam before it reaches a user…
Program that protects a computer against viruses by identifyi…
Program or set of instructions in a program that allow users…
adware
Program that displays an online advertisement in a banner or…
anti-spam program
Program that attempts to remove spam before it reaches a user…
15 terms
Security+ Chapter 1
C
A
C
B
What are the three primary goals of Information Security?... A.…
What is the definition of a risk?... A. An exposure to the chan…
What is the definition of a vulnerability?... A. An exposure to…
What is the definition of a threat?... A. An exposure to the ch…
C
What are the three primary goals of Information Security?... A.…
A
What is the definition of a risk?... A. An exposure to the chan…
90 terms
Computer security ch1
Malware
computer virus
antivirus software
Worm
may damage hardware or software or leak information
a piece of code that is capable of copying itself and typical…
detects and removed virus program
A worm is malware that constantly scans the internet, searchi…
Malware
may damage hardware or software or leak information
computer virus
a piece of code that is capable of copying itself and typical…
32 terms
Computer Security Ch-1
•Definition of computer security
Three key objectives known as the CIA…
Confidentiality
Data Confidentiality
The protection afforded to an automated information system in…
Confidentiality, Integrity, Availability
Preserving authorized restriction on information access and d…
Assures that private or confidential information is not made…
•Definition of computer security
The protection afforded to an automated information system in…
Three key objectives known as the CIA…
Confidentiality, Integrity, Availability
50 terms
Introduction to Security - Chapter 1
Accounting
Asset
Authorization
Authentication
The ability that provides tracking of events.
An item that has value.
The act of ensuring that an individual or element is genuine.
The steps that ensure that the individual is who they claim t…
Accounting
The ability that provides tracking of events.
Asset
An item that has value.
14 terms
Security+ Chapter 1: Organizational Security
Due diligence
Due process
Security policy
Mandatory vacation
a company identifies the risks to its business, develops and…
Everyone held to the same standard; impartial and fair inquir…
policies concerning general organizational security including…
a policy that requires employees to use their vacations at sp…
Due diligence
a company identifies the risks to its business, develops and…
Due process
Everyone held to the same standard; impartial and fair inquir…
12 terms
Computer Security 1
Trojan horse
cyberbullying
download
email
Trojan is a type of malware designed to provide unauthorized,…
Bullying through Internet applications and technologies such…
Information retrieved from the Internet, discs or CDs, and ot…
A service that allows people to send messages with pictures a…
Trojan horse
Trojan is a type of malware designed to provide unauthorized,…
cyberbullying
Bullying through Internet applications and technologies such…
171 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
56 terms
Security+ Chapter 1
Confidentiality
Measures to ensure confidentiality
Integrity
Hashing
Prevents the unauthorized disclosure of data
Encryption, Access Controls, Steganography
Provides assurances that data has not been modified, tampered…
Verifies integrity. A numeric value created by executing an a…
Confidentiality
Prevents the unauthorized disclosure of data
Measures to ensure confidentiality
Encryption, Access Controls, Steganography
24 terms
Computer Security Midterm CH 1
F
T
T
T
Threats are attacks carried out.... True or False
Computer security is protection of the integrity, availabilit…
Data integrity assures that information and programs are chan…
Availability assures that systems works promptly and service…
F
Threats are attacks carried out.... True or False
T
Computer security is protection of the integrity, availabilit…
Security + | Chapter 1 Terms (Introduction to Security)
Accounting
Asset
Authorization
Authentication
The ability that provides tracking of events.
An item that has value.
The act of ensuring that an individual or element is genuine.
The steps that ensure that the individual is who they claim t…
Accounting
The ability that provides tracking of events.
Asset
An item that has value.
89 terms
Chapter 11 Computer Security
Computer Security Risk
Cybercrime
Crimeware
Hacker
any event or action that could cause a loss of or damage to c…
any online or Internet-based illegal act
software used by cybercriminals
refers to a person that access a computer or network illegally
Computer Security Risk
any event or action that could cause a loss of or damage to c…
Cybercrime
any online or Internet-based illegal act
33 terms
Computer Security Chapter 5
Algorithm
Block Cipher
Ciphertext
Collision Attack
a step-by-step, recursive computational procedure for solving…
segmenting the input data into blocks of a specified size, ty…
encrypted output from a cipher system
an attacker finds two different messages that hash to the sam…
Algorithm
a step-by-step, recursive computational procedure for solving…
Block Cipher
segmenting the input data into blocks of a specified size, ty…
26 terms
Computer Security Chapter 6
authority revocation list (ARL)
CA certificate
certificate
certificate authority (CA)
separate revocation list is maintained for CA keys that have…
can be self signed, or given with an hierarical model (furthe…
third party credential documents used to vouch for the trustw…
a trusted authority that certifies individuals' identities an…
authority revocation list (ARL)
separate revocation list is maintained for CA keys that have…
CA certificate
can be self signed, or given with an hierarical model (furthe…
28 terms
Information Security Chapter 1
Acceptable use policy (AUP)
Availability
biometric
BlackBerry
allowable for organization assets and employees
info sys can be accessed and used when needed... displayed as a…
measures physiological characteristic for positive identifica…
electornic devices and services--usually mobile or wireless d…
Acceptable use policy (AUP)
allowable for organization assets and employees
Availability
info sys can be accessed and used when needed... displayed as a…
Principles Of Computer Security Chapters 1
Which threats are characterized by pos…
Which of the following is an attempt t…
Which of the following threats has not…
The rise of which of the following has…
Correct Answer is: B
Correct Answer is: A
Correct Answer is: D
Correct Answer is: B
Which threats are characterized by pos…
Correct Answer is: B
Which of the following is an attempt t…
Correct Answer is: A
14 terms
Computer Security Chapter 7
Certificate
Certificate Authority (CA)
Certificate Revocation List (CRL)
Internet Security Association and Key…
a data structure that binds a public key to subjects (unique…
responsible for issuing, storing, and revoking certificates--…
a digitally signed object that lists all of the current but r…
provides a method for implementing a key exchange protocol an…
Certificate
a data structure that binds a public key to subjects (unique…
Certificate Authority (CA)
responsible for issuing, storing, and revoking certificates--…
38 terms
Security + Chapter 1
Acceptance
Accounting
Advance Persistence Threat
Asset
Acknowledging a risk, but taking no action to address it.
The ability that provides tracking of events.
APT; Multiyear intrusion campaign that targets highly sensiti…
An item that has value.
Acceptance
Acknowledging a risk, but taking no action to address it.
Accounting
The ability that provides tracking of events.
10 terms
Info Assurance & Computer Security Ch 1
threat environment
security goals
confidentiality, integrity, availability
confidentiality
The types of attackers and attacks companies face. - know you…
Confidentiality, integrity, and availability make up what?
What are the three security goals?
Means that people cannot read sensitive information, either w…
threat environment
The types of attackers and attacks companies face. - know you…
security goals
Confidentiality, integrity, and availability make up what?
14 terms
Security+ Chapter 1: Organizational Security
Due diligence
Due process
Security policy
Mandatory vacation
a company identifies the risks to its business, develops and…
Everyone held to the same standard; impartial and fair inquir…
policies concerning general organizational security including…
a policy that requires employees to use their vacations at sp…
Due diligence
a company identifies the risks to its business, develops and…
Due process
Everyone held to the same standard; impartial and fair inquir…
63 terms
Computer Security Exam 1
CIA Traid
Three data states are...and which ones…
What is a vulnerability
What is a threat
Confidentiality, Integrity, Availability
1. Rest... 2. Process (only one that cannot be encrypted)... 3. Tra…
is a weakness in the system (comp or entire system) that coul…
something that can cause damage to C, I or A - could be a hac…
CIA Traid
Confidentiality, Integrity, Availability
Three data states are...and which ones…
1. Rest... 2. Process (only one that cannot be encrypted)... 3. Tra…
37 terms
Chapter 1 - Security Basics
What is the security triad?
What methods are used to ensure confid…
What methods are used to ensure integr…
What methods are used to ensure availa…
Confidentiality, integrity, and availability
Encryption... Access Controls -... Identification: Claiming identi…
Hashing... Digital Signatures - proves a file was created by an…
Redundancy and Fault Tolerance-... Disk redundancy - RAID-1,5,6…
What is the security triad?
Confidentiality, integrity, and availability
What methods are used to ensure confid…
Encryption... Access Controls -... Identification: Claiming identi…
10 terms
Computer Security Basics (Set #1)
adware
authentication
back door
bluesnarfing
A form of spyware software that collects information about th…
Validation of a user account and password that occurs before…
A way to bypass security and gain access to a computer.
The act of covertly obtaining information broadcast from wire…
adware
A form of spyware software that collects information about th…
authentication
Validation of a user account and password that occurs before…
157 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
42 terms
Intro to computer security: CH 1
CIA
Confidentiality
Integrity
Availability
Confidentiality Integrity Availability
preserving authorized restrictions on information access and…
guards against improper information modification or destructi…
ensuring timely and reliable access to and use of information
CIA
Confidentiality Integrity Availability
Confidentiality
preserving authorized restrictions on information access and…
18 terms
Security+ Chapter 1
Hub
MAC Address
MAC Address Table
Switch
an older networking device used to connect all the systems to…
a hardware ID number that uniquely identifies each device on…
a table stored in memory on the switch that is responsible fo…
a networking device used to connect all systems together in a…
Hub
an older networking device used to connect all the systems to…
MAC Address
a hardware ID number that uniquely identifies each device on…
157 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
15 terms
Computer Security Chapter 12
Why does WTLS support short key lengths?
Why should wireless have strong two-wa…
Why is 802.11 wireless more of a secur…
Bluebugging can give an attacker what?
WTLS has to support devices with low processor power and limi…
Strong authentication is needed so that all virus definitions…
It provides access to the physical layer of Ethernet without…
Total control over a mobile phone
Why does WTLS support short key lengths?
WTLS has to support devices with low processor power and limi…
Why should wireless have strong two-wa…
Strong authentication is needed so that all virus definitions…
52 terms
Week 1 - Computer Security
________ assures that a system perform…
In the context of security, our concer…
Security mechanisms typically do not i…
The assurance that data received are e…
System integrity
True
True
data integrity
________ assures that a system perform…
System integrity
In the context of security, our concer…
True
15 terms
Computer Security - Lecture 1
What does CIA stand for?
What is confidentiality?
Confidentiality is ____ to ensure and…
What is integrity?
Confidentiality, Integrity, Availablity
Ensure only authorized users can access data
difficult, easy
Concerned with unauthorized modification of... assets
What does CIA stand for?
Confidentiality, Integrity, Availablity
What is confidentiality?
Ensure only authorized users can access data
21 terms
Quiz for Lesson 1 - Computer Security
Computer Security
Computer Privacy
Natural Threats
Back up Data
To protect your computer & data getting damaged
Means that your data is not
Nature can lead to major physical damage to computers & loss…
Making multiple copies of your work
Computer Security
To protect your computer & data getting damaged
Computer Privacy
Means that your data is not
38 terms
Security+ Chapter 1 Terms
Acceptance
Accounting
Advanced Persistent Threat (APT)
Asset
Acknowledging a risk but not taking action to address it
Ability to track events
Multi-year intrusion campaign that targets highly sensitive e…
An item that has value.
Acceptance
Acknowledging a risk but not taking action to address it
Accounting
Ability to track events
48 terms
Chapter1 Security+
BIA
Business Impact Analysis
ALE
Annual Loss Expectancy
Business impact analysis
The process of evaluating all of the critical systems in an o…
Annual Loss Expectancy
This is the monetary measure of how much loss you can expect…
BIA
Business impact analysis
Business Impact Analysis
The process of evaluating all of the critical systems in an o…
42 terms
Chapter 1 Security
Confidentiality
Steganography
Integrity
Hash
prevents the unauthorized disclosure of data
it is the practice of hiding data within data, provides confi…
provides assurances that data has not modified, tampered with…
is simply a number created by executing a hashing algorithm a…
Confidentiality
prevents the unauthorized disclosure of data
Steganography
it is the practice of hiding data within data, provides confi…
20 terms
Security+ Chapter 1
Each of the following is a reason why…
In a general sense, "security" is ____…
_____ ensures that only authorized par…
Each of the following is a successive…
C. Complexity of attack tools.
the necessary steps to protect a person or property from harm
C. Confidentiality
b. Purposes
Each of the following is a reason why…
C. Complexity of attack tools.
In a general sense, "security" is ____…
the necessary steps to protect a person or property from harm
79 terms
Security+ Network Security Fundamentals Chapter 1 & 2
True
True
manager
security technician
The CompTIA Security+ Certification is aimed at an IT securit…
Security is the goal to be free from danger as well as the pr…
What information security position reports to the CISO and su…
Which position below is considered an entry-level position fo…
True
The CompTIA Security+ Certification is aimed at an IT securit…
True
Security is the goal to be free from danger as well as the pr…
26 terms
Cyber Security Chapter 1
Attack
Attack Code
Availability
Computer Virus
The act of using attack code against a system or of exploitin…
A program or other implementation of an exploit used to attac…
Term describing whether or not information is accessible to a…
A program that enters a computer usually without the knowledg…
Attack
The act of using attack code against a system or of exploitin…
Attack Code
A program or other implementation of an exploit used to attac…
20 terms
Computer Security Chapter 4
Each of the following is true about th…
What is the format used to write World…
A(n) ______ identifies the program or…
Which of these protocols handles outgo…
It is a local network of computers and networks.
Hypertext Markup Language (HTML)
port number
Simple Mail Transfer Protocol (SMTP)
Each of the following is true about th…
It is a local network of computers and networks.
What is the format used to write World…
Hypertext Markup Language (HTML)
35 terms
Security+ Chapter 1
What is the most common name for the f…
Why is the Morris worm significant?... -…
What is the most common threat to info…
The term "script kiddies" refers to... -…
The Morris Worm
This was the first large-scale attack on the Internet.
Computer viruses
A hacker of low-end technical ability
What is the most common name for the f…
The Morris Worm
Why is the Morris worm significant?... -…
This was the first large-scale attack on the Internet.
12 terms
Security+ Chapter 1
A user copies files from her desktop t…
Smart phones with cameras and Internet…
By definition, which security concept…
You computer system is a participant i…
Confidentiality
Confidentiality
Confidentiality
Integrity
A user copies files from her desktop t…
Confidentiality
Smart phones with cameras and Internet…
Confidentiality
1 of 10