100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
06-11-2025
Written in
2025/2026

CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers CSE 4471 Exam 1 Information Security, Ohio State University-Main Campus complete questions and correct detailed answers verified answers

Show more Read less
Institution
CSE 4471
Course
CSE 4471









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSE 4471
Course
CSE 4471

Document information

Uploaded on
November 6, 2025
Number of pages
15
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cse 4471 exam 1

Content preview

11/6/25, 8:17 PM CSE 4471

Science Computer Science Computer Security and Reliability




CSE 4471 Exam 1 Information Security, Ohio State
University-Main Campus \complete questions and
correct detailed answers \verified answers


Information System Software, Hardware, Data, People, Procedure, Network
Protection of information and critical elements including
Information Security
use, storage, and transmission. Uses policy, awareness,
training, education, and technology
Key component in information system, subject or object
Computer
of attack - can be on either side of the attack
Between protection and availability. Level must allow
Balance
access to authorized users, but protect against
threats.
CIA Triangle Confidentiality, Integrity, Availability
Began with the first mainframes in WWII, with ARPA.
History of Information Rand Report R-609 began study of safety of data,
Security
limiting unauthorized access, involvement of
personnel from multiple levels of an organization
Access Ability to interact with resource, illegal or legal
Asset Specific resource of value
Attack Act, intentional or unintentional that may damage asset
Countermeasure Mechanism or policy intended to improve security




/ 1/1
5

, 11/6/25, 8:17 PM CSE 4471



Exploit Technique used to compromise a system
Loss Instance of asset suffering damage
Threat Agent Person/system who uses exploit to instantiate threat
Vulnerability System weakness or fault that decreases security
Available Attribute which is accessible for use w/o obstruction
Accurate Attribute which is free from errors
Authentic Attribute which is genuine
Confidential Attribute which has access restrictions
Integrity Attribute which is complete and uncorrupted
Utility Attribute which has useful purpose
Possession Attribute which describes data ownership
Transmission, Storage,
CNSS Security Model Processing Confidentiality,
Integrity, Availability
Education, Policy,
Technology
Applications, OS, Utility. Difficult to secure, bugs can be
Software
exploited, created under time/cost constraints and
security is usually an afterthought
Physical computational technology - often no
Hardware
guarantee of security if physical access to
hardware is gained
Physical communication technology - no guarantee if
Networks
physical access is gained, miles of coverage,
increased potential for access by unauthorized
users
Stored, processed, or transmitted assets. Most
Data
valuable, wide variation of usage, approach is often
haphazard, inconsistent, and solutions often
impede access
Protection of written instruction and policy - often
Procedures
overlooked and loss thereof can result in loss
C-2 TCSEC Discretionary Grant/deny access to specific resources to users/groups
Access Control
C-2 TCSEC Individual User identification via unique password
Authentication/Login
C-2 TCSEC Object Reuse Memory and disk must not be readable after deletion
/ 2/1
5

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSEGENERAL Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
69
Member since
1 year
Number of followers
3
Documents
7635
Last sold
1 week ago
Homeland bookshop

It is a modern bookshop that provide accurate documents such as revision papers ,exams , notes , essays , summaries , flashcards and other study materials. Discover any material you want on my site and feel free to contact me at my email WELCOME ALL !!!! WELCOME ALL!!

4.5

10 reviews

5
6
4
3
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions