threat agent Correct Ans-a person or system who uses exploits to instantiate threats
vulnerability Correct Ans-a system weakness or fault which decreases security; the
intersection of a threat with an asset
accessible Correct Ans-an attribute of information which is reachable or has a known
location without access restriction
available Correct Ans-an attribute of information which is accessible for use without
obstruction
accurate Correct Ans-an attribute of information which is free from errors
authentic Correct Ans-an attribute of information which is genuine
confidential Correct Ans-an attribute of information which has access restrictions
integrity Correct Ans-an attribute of information which is complete and uncorrupted
utility Correct Ans-an attribute of information which has a useful purpose
, CSE 4471 Midterm Exam with Complete Solutions
possession Correct Ans-an attribute of information describing data ownership or control
software Correct Ans-applications, operating system, and utilities
hardware Correct Ans-physical computational technologies
networks Correct Ans-physical communications technologies
data Correct Ans-stored, processes or transmitted assets
people Correct Ans-everyone in the organization
procedures Correct Ans-protection of written instructions and policies
attributes of TCSEC C-2 security Correct Ans-- discretionary access control
- individual authentication/login
- object reuse
- audit trails
- resource isolation
- private files