100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Computer Security: Principles and Practice, 4th edition by William Stallings, All Chapters 1-24

Rating
3.0
(1)
Sold
2
Pages
173
Grade
A+
Uploaded on
16-12-2024
Written in
2024/2025

Test Bank for Computer Security: Principles and Practice, 4th edition by William Stallings, All Chapters 1-24. Full Chapters Include;.....Chapter 1 Overview 1.1 Computer Security Concepts 1.2 Threats, Attacks, and Assets 1.3 Security Functional Requirements 1.4 Fundamental Security Design Principles 1.5 Attack Surfaces and Attack Trees 1.6 Computer Security Strategy 1.7 Standards 1.8 Key Terms, Review Questions, and Problems PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools 2.1 Confidentiality with Symmetric Encryption 2.2 Message Authentication and Hash Functions 2.3 Public-Key Encryption 2.4 Digital Signatures and Key Management 2.5 Random and Pseudorandom Numbers 2.6 Practical Application: Encryption of Stored Data 2.7 Key Terms, Review Questions, and Problems Chapter 3 User Authentication 3.1 Digital User Authentication Principles 3.2 Password-Based Authentication 3.3 Token-Based Authentication 3.4 Biometric Authentication 3.5 Remote User Authentication 3.6 Security Issues for User Authentication 3.7 Practical Application: An Iris Biometric System 3.8 Case Study: Security Problems for ATM Systems 3.9 Key Terms, Review Questions, and Problems Chapter 4 Access Control 4.1 Access Control Principles 4.2 Subjects, Objects, and Access Rights 4.3 Discretionary Access Control 4.4 Example: UNIX File Access Control 4.5 Role-Based Access Control 4.6 Attribute-Based Access Control 4.7 Identity, Credential, and Access Management 4.8 Trust Frameworks 4.9 Case Study: RBAC System for a Bank 4.10 Key Terms, Review Questions, and Problems Chapter 5 Database and Data Center Security 5.1 The Need for Database Security 5.2 Database Management Systems 5.3 Relational Databases 5.4 SQL Injection Attacks 5.5 Database Access Control 5.6 Inference 5.7 Database Encryption 5.8 Data Center Security 5.9 Key Terms, Review Questions, and Problems Chapter 6 Malicious Software 6.1 Types of Malicious Software 6.2 Advanced Persistent Threat 6.2 Propagation — Infected Content - Viruses 6.3 Propagation — Vulnerability Exploit - Worms 6.4 Propagation — Social Engineering — SPAM E-Mail, Trojans 6.5 Payload — System Corruption 6.6 Payload — Attack Agent — Zombie, Bots 6.7 Payload — Information Theft — Keyloggers, Phishing, Spyware 6.8 Payload — Stealthing — Backdoors, Rootkits 6.9 Countermeasures 6.10 Key Terms, Review Questions, and Problems Chapter 7 Denial-of-Service Attacks 7.1 Denial-of-Service Attacks 7.2 Flooding Attacks 7.3 Distributed Denial-of-Service Attacks 7.4 Application-Based Bandwidth Attacks 7.5 Reflector and Amplifier Attacks 7.6 Defenses Against Denial-of-Service Attacks 7.7 Responding to a Denial-of-Service Attack 7.8 Key Terms, Review Questions, and Problems Chapter 8 Intrusion Detection 8.1 Intruders 8.2 Intrusion Detection 8.3 Analysis Approaches 8.4 Host-Based Intrusion Detection 8.5 Network-Based Intrusion Detection 8.6 Distributed or Hybrid Intrusion Detection 8.7 Intrusion Detection Exchange Format 8.8 Honeypots 8.9 Example System: Snort 8.10 Key Terms, Review Questions, and Problems Chapter 9 Firewalls and Intrusion Prevention Systems 9.1 The Need for Firewalls 9.2 Firewall Characteristics and Access Policy 9.3 Types of Firewalls 9.4 Firewall Basing 9.5 Firewall Location and Configurations 9.6 Intrusion Prevention Systems 9.7 Example: Unified Threat Management Products 9.8 Key Terms, Review Questions, and Problems PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS Chapter 10 Buffer Overflow 10.1 Stack Overflows 10.2 Defending Against Buffer Overflows 10.3 Other Forms of Overflow Attacks 10.4 Key Terms, Review Questions, and Problems Chapter 11 Software Security 11.1 Software Security Issues 11.2 Handling Program Input 11.3 Writing Safe Program Code 11.4 Interacting with the Operating System and Other Programs 11.5 Handling Program Input 11.6 Key Terms, Review Questions, and Problems Chapter 12 Operating System Security 12.1 Introduction to Operating System Security 12.3 System Security Planning 12.3 Operating Systems Hardening 12.4 Application Security 12.5 Security Maintenance 12.6 Linux/UNIX Security 12.7 Windows Security 12.8 Virtualization Security 12.9 Key Terms, Review Questions, and Problems Chapter 13 Cloud and IoT Security 13.1 Cloud Computing 13.2 Cloud Security Concepts 13.3 Cloud Security Approaches 13.4 The Internet of Things 13.5 IoT Security 13.6 Key Terms, Review Questions, and Problems PART THREE MANAGEMENT ISSUES Chapter 14 IT Security Management and Risk Assessment 14.1 IT Security Management 14.2 Organizational Context and Security Policy 14.3 Security Risk Assessment 14.4 Detailed Security Risk Analysis 14.5 Case Study: Silver Star Mines 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 IT Security Controls, Plans and Procedures 15.1 IT Security Management Implementation 15.2 Security Controls or Safeguards 15.3 IT Security Plan 15.4 Implementation of Controls 15.5 Monitoring Risks 15.6 Case Study: Silver Star Mines 15.7 Key Terms, Review Questions, and Problems Chapter 16 Physical and Infrastructure Security 16.1 Overview 16.2 Physical Security Threats 16.3 Physical Security Prevention and Mitigation Measures 16.4 Recovery from Physical Security Breaches 16.5 Example: A Corporate Physical Security Policy 16.6 Integration of Physical and Logical Security 16.7 Key Terms, Review Questions, and Problems Chapter 17 Human Resources Security 17.1 Security Awareness, Training, and Education 17.2 Employment Practices and Policies 17.3 E-Mail and Internet Use Policies 17.4 Computer Security Incident Response Teams 17.5 Key Terms, Review Questions, and Problems Chapter 18 Security Auditing 18.1 Security Auditing Architecture 18.2 The Security Audit Trail 18.3 Implementing the Logging Function 18.4 Audit Trail Analysis 18.5 Security Information and Event Management 18.6 Key Terms, Review Questions, and Problems Chapter 19 Legal and Ethical Aspects 19.1 Cybercrime and Computer Crime 19.2 Intellectual Property 19.3 Privacy 19.4 Ethical Issues 19.5 Key Terms, Review Questions, and Problems Appendix 19A: Information Privacy Standard of Good Practice PART FOUR CRYPTOGRAPHIC ALGORITHMS Chapter 20 Symmetric Encryption and Message Confidentiality 20.1 Symmetric Encryption and Message Confidentiality 20.2 Data Encryption Standard 20.3 Advanced Encryption Standard 20.4 Stream Ciphers and RC4 20.5 Cipher Block Modes of Operation 20.6 Key Distribution 20.8 Key Terms, Review Questions, and Problems Chapter 21 Public-Key Cryptography and Message Authentication 21.1 Secure Hash Functions 21.2 HMAC 21.3 Authenticated Encryption 21.4 The RSA Public-Key Encryption Algorithm 21.5Diffie-Hellman and Other Asymmetric Algorithms 21.6 Key Terms, Review Questions, and Problems PART FIVE NETWORK SECURITY Chapter 22 Internet Security Protocols and Standards 22.1 Secure Email and S/MIME 22.2 DomainKeys Identified Mail 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 22.4 HTTPS 22.5 IPv4 and IPv6 Security 22.6 Key Terms, Review Questions, and Problems Chapter 23 Internet Authentication Applications 23.1 Kerberos 23.2 X.509 23.3 Public-Key Infrastructure 23.4 Federated Identity Management 23.5 Key Terms, Review Questions, and Problems Chapter 24 Wireless Network Security 24.1 Wireless Security Overview 24.2 Mobile Device Security 24.3 IEEE 802.11 Wireless LAN Overview 24.4 IEEE 802.11i Wireless LAN Security 24.5 Key Terms, Review Questions, and Problems

Show more Read less
Institution
Computer Security
Course
Computer Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security
Course
Computer Security

Document information

Uploaded on
December 16, 2024
Number of pages
173
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security: Principles and Practice, 4th edition, William Stallings




TEST BANK
M
ED

Computer Security: Principles and
CO

Practice, 4th edition

Authors: William Stallings, Lawrie Brown
NN

◊ ALL CHAPTERS
OI

◊ PDF DOWNLOAD💯💯💯

◊ ORIGINAL FROM PUBLISHER
SS
EU
R

MEDCONNOISSEUR

,Computer Security: Principles and Practice, 4th Edition Chapter 1

Chapter 1 – Computer Systems Overview


TRUE/FALSE QUESTIONS:
T F 1. Threats are attacks carried out.
M
T F 2. Computer security is protection of the integrity, availability, and
confidentiality of information system resources.

T F 3. Data integrity assures that information and programs are changed only
ED
in a specified and authorized manner.

T F 4. Availability assures that systems works promptly and service is not
denied to authorized users.
C
T F 5. The “A” in the CIA triad stands for “authenticity”.

T F 6. The more critical a component or service, the higher the level of
ON
availability required.

T F 7. Computer security is essentially a battle of wits between a perpetrator
who tries to find holes and the administrator who tries to close them.

T F 8. Security mechanisms typically do not involve more than one particular
NO
algorithm or protocol.

T F 9. Many security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system.

T F 10. In the context of security our concern is with the vulnerabilities of
IS
system resources.

T F 11. Hardware is the most vulnerable to attack and the least susceptible to
SE
automated controls.

T F 12. Contingency planning is a functional area that primarily requires
computer security technical measures.
U
T F 13. X.800 architecture was developed as an international standard and
focuses on security in the context of networks and communications.
R
T F 14. The first step in devising security services and mechanisms is to
develop a security policy.

T F 15. Assurance is the process of examining a computer product or system
with respect to certain criteria.

,Computer Security: Principles and Practice, 4th Edition Chapter 1

MULTIPLE CHOICE QUESTIONS:
1. __________ assures that individuals control or influence what information related
to them may be collected and stored and by whom and to whom that information
may be disclosed.
A. Availability B. System Integrity
M
C. Privacy D. Data Integrity
2. ________ assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the
ED
system.
A. System Integrity B. Data Integrity
C. Availability D. Confidentiality
C
3. A loss of _________ is the unauthorized disclosure of information.
A. confidentiality B. integrity
ON
C. authenticity D. availability
4. A ________ level breach of security could be expected to have a severe or
catastrophic adverse effect on organizational operations, organizational assets, or
individuals.
NO
A. low B. normal
C. moderate D. high
5. A flaw or weakness in a system’s design, implementation, or operation and
management that could be exploited to violate the system’s security policy is
IS
a(n) __________.
A. countermeasure B. vulnerability
SE
C. adversary D. risk
6. An assault on system security that derives from an intelligent act that is a
deliberate attempt to evade security services and violate the security policy of a
system is a(n) __________.
U
A. risk B. asset
R
C. attack D. vulnerability

, Computer Security: Principles and Practice, 4th Edition Chapter 1

7. A(n) __________ is an action, device, procedure, or technique that reduces a
threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing
the harm it can cause, or by discovering and reporting it so that correct action can
be taken.
A. attack B. countermeasure
M
C. adversary D. protocol
8. A(n) _________ is an attempt to learn or make use of information from the system
that does not affect system resources.
ED
A. passive attack B. inside attack
C. outside attack D. active attack
9. Masquerade, falsification, and repudiation are threat actions that cause
__________ threat consequences.
C
A. unauthorized disclosure B. deception
ON
C. disruption D. usurpation
10. A threat action in which sensitive data are directly released to an unauthorized
entity is __________.
A. corruption B. disruption
NO
C. intrusion D. exposure
11. An example of __________ is an attempt by an unauthorized user to gain access
to a system by posing as an authorized user.
A. masquerade B. interception
IS
C. repudiation D. inference
12. The _________ prevents or inhibits the normal use or management of
SE
communications facilities.
A. passive attack B. traffic encryption
C. denial of service D. masquerade
U
13. A __________ is any action that compromises the security of information owned
by an organization.
R
A. security mechanism B. security attack
C. security policy D. security service

Reviews from verified buyers

Showing all reviews
7 months ago

7 months ago

Thank you for shopping with us. We really appreciate your review. If you're Looking for Any Study Materials (exams, test bank, ATI, Hesi etc.) email us on kagzmines@gmail.com We’re looking forward to hear from you soon!

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedConnoisseur West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2525
Member since
3 year
Number of followers
1735
Documents
2283
Last sold
4 days ago
MedConnoisseur Study Hub – Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

Welcome to Your Ultimate Study Resource Hub! Looking for high-quality, reliable, and exam-ready study materials? You’re in the right place. Our shop specializes in original publisher content, including solutions manuals, test banks, and comprehensive study guides that are ideal for university and college students across various subjects. Every document is in PDF format and available for instant download—no waiting, no hassle. That means you get immediate access to top-tier academic resources the moment you need them, whether you're cramming for an exam or studying ahead. These materials are especially effective for exam preparation, offering step-by-step solutions, real test formats, and well-organized study guides that align with your coursework and textbooks. Whether you're a visual learner, a problem-solver, or need practice questions—there’s something for every study style. Love what you get? Share it! Help your mates and classmates succeed too by referring them to our shop. More learners, more success for all.

Read more Read less
4.0

189 reviews

5
99
4
37
3
24
2
9
1
20

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions