IT Security: Defense against the digital dark arts. Week1: Understanding Security Threats
IT Security: Defense against the digital dark arts. Week1: Understanding Security Threats In the CIA Triad, "Confidentiality" means ensuring that data is: not accessible by unwanted parties; "Confidentiality," in this context, means preventing unauthorized third parties from gaining access to the data. In the CIA Triad, "Integrity" means ensuring that data is: accurate and was not tampered with; "Integrity," in this context, means ensuring that the data remains intact, uncorrupted, and not tampered with. The data that gets sent is the exact same as the data that gets received. In the CIA Triad, "Availability" means ensuring that data is: available and people can access it; "Availability," in this context, means ensuring that data and services remain accessible to those who are authorized to access them. What's the relationship between a vulnerability and an exploit? an exploit takes advantage of a vulnerability to run arbitrary code or gain access; A vulnerability is a bug or hole in a system. It allows an attacker to gain access by using an exploit, which takes advantage of the vulnerability. Which statement is true for both a worm and a virus? they're self-replicating and selfpropagating; Both worms and viruses are capable of spreading themselves using a variety of transmission means. Check all examples of types of malware: worms adware viruses; These three are all examples of unwanted software that can cause adverse affects to an infected system, which is exactly what malware is
Written for
- Institution
- IT SECURITY
- Course
- IT SECURITY
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 6
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts
Also available in package deal