And Practice Review
Save
Practice questions for this set
Learn 1 /7 Study using Learn
CPU Scheduling *(349)
Choose an answer
Set of Techniques and policy enforced
Using a web page to masquerade as
by an organization or individual to
1 2 part of a trusted system to trick users
ensure proper access to protected
to reveal security information
data
The degree to which authorized users
The act of determining which process
3 can access appropriate information 4
in memory is given to the CPU
when needed.
Don't know?
Terms in this set (75)
Set of Techniques and policy enforced Information Security (Ch 16 p541)
by an organization or individual to
ensure proper access to protected
data
, CIA Triad Confidentiality, Integrity, Availability
Ensuring that key data remains Confidentiality
protected from unauthorized access.
ensuring that data can only be Integrity
modified by appropriate mechanisms
The degree to which authorized users Availability
can access appropriate information
when needed.
The process of verifying the User Authentication
credentials of a particular user of
computer or software system
3 types of user ID and give examples Something the User Has: ID card
Something the User Is: Biometric (Retina scanners,
voice analysis)
Something the User knows: Username/Password
Computer program that attempts to Malware
bypass appropriate authorization
safe-guards and/or perform
unauthorized functions
Self replicating program that embeds Virus
itself in other code, often targets
individual computers
Self replicating, stand alone program, Worm
target network and resources
Malicious program disguised as Trojan Horse
benevolent resource, target individual
computers
Types of Security Attacks Password Guessing, Phishing, DoS, DDoS