Practice (Ch. 1) Overview| Verified
Exam Questions with 100% Correct
Clear Verified Answers| All Graded
A+ |100% Guaranteed
Success|Latest Premium Update.
Computer security - Answer✅✅Measures and controls that ensure confidentiality,
integrity, and availability of information system assets including hardware, software,
firmware, and information being processed, stored, and communicated.
Data confidentiality - Answer✅✅Assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
Privacy - Answer✅✅Assures that individuals control or influence what information
related to them may be collected and stored and by whom and to whom that
information may be disclosed.
data integrity - Answer✅✅Assures that information and programs are changed
only in a specified and authorized manner
System Integrity - Answer✅✅Assures that a system performs its intended function
in an unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system
Availability - Answer✅✅Assures that systems work promptly and service is not
denied to authorized users
, Confidentiality - Answer✅✅Preserving authorized restrictions on information
access and disclosure, including means for protecting personal privacy and
proprietary information.
Integrity - Answer✅✅Guarding against improper information modification or
destruction, including ensuring information nonrepudiation and authenticity. A loss
of integrity is the unauthorized modification or destruction of information.
Availability - Answer✅✅Ensuring timely and reliable access to and use of
information
Authenticity - Answer✅✅The property of being genuine and being able to be
verified and trusted; confidence in the validity of a transmission, a message, or
message originator.
Accountability - Answer✅✅The security goal that generates the requirement for
actions of an entity to be traced uniquely to that entity.
The system can be _______, so it does the wrong thing or gives wrong answers. -
Answer✅✅Corrupted
Adversary (threat agent) - Answer✅✅Individual, group, organization, or
government that conducts or has the internet to conduct detrimental activities.
Attack - Answer✅✅Any kind of malicious activity that attempts to collect, disrupt,
deny, degrade, or destroy information system resources or the information itself.
Countermeasure - Answer✅✅A device or techniques that has as its objective the
impairment of the operational effectiveness of undesirable or adversarial activity, or
the prevention of espionage, sabotage, theft, or unauthorized access to or use of
sensitive information or information systems.
Risk - Answer✅✅A measure of the extent to which an entity is threatened by a
potential circumstance or event, and typically a function of 1) the adverse impacts
that would arise if the circumstance or event occurs; and 2) the likelihood of
occurrence.
Security policy - Answer✅✅A set of criteria for the provision of security services. It
defines and constrains the activities of a data processing facility in order to maintain
a condition of security for systems and data.
System resource (asset) - Answer✅✅A major application, general support system,
high impact program, physical plant, mission critical system, personnel, equipment,
or a logically related group of systems.