Week 1 - IT Security - Defense against Digital Arts Already Passed
Week 1 - IT Security - Defense against Digital Arts Already Passed Confidentiality, Integrity, and Availability form the CIA triad. CIA triad ___________________________ refers to data only viewable by authorized users. Confidentiality ________________________ Refers to data that won't be manipulated or corrupted. Integrity ___________________ means that services remain reachable and available. Availability _________________ refers to the possibility of suffering a loss in the event of an attack on the system. Risk A flaw in the system that could be exploited to compromise the system is called a ____________________. Vulnerability A vulnerability that is not known to the software developer or vendor, but is known to an attacker is called a ____________________________. The name refers to the amount of time the software vendor has had to react to and to fix the vulnerability, zero days. Zero day vulnerability An ______________________ is software that is used to take advantage of a security bug or vulnerability. Exploit A _______________ is the possibility of danger that could exploit a vulnerability. Threats are just possible attackers, sort of like burglars. Not all burglars will attempt to break into your home to steal your most prized possessions, but they could, and so they're considered threats. threatA ________________ in the security world is someone who attempts to break into or exploit a system. hacker ______________________ hackers attempt to find weaknesses in a system, but also alert the owners of those systems so that they can fix it before someone else does something malicious. white hat
Written for
- Institution
- IT SECURITY
- Module
- IT SECURITY
Document information
- Uploaded on
- April 29, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
week 1 it security defense against digital art
Also available in package deal