• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
What are threats and countermeasures?
Threats are threats to computer security, and countermeasures are any procedure to prevent a threat.
What is the difference between physical and logical countermeasures?
Physical countermeasures in bald protection of assets from physical access, all logical countermeasures involve protection from network access.
If someone accessed a school computer without authorization to look at student rates, with this be a threat to secrecy, integrity, or necessity? What if that person also changed student grades?
Secrecy.
Integrity.
A denial of service attack is an example of a threat to secrecy, integrity or necessity?
Necessity.
What are the potential threats a local business faces?
Electronic commerce threats involve security throughout the commerce chain including the client computers, the messages traveling on the channel communication, both the Web and commerce server, and any hardware attached to those servers. Entire chain is only as secure as the weakest link in the chain.
The computer emergency response team is the U.S. government's reaction to attacks in computer networks. How do they perform their mandate?
CERT. CERT was organized about a decade ago in response to the Internet warm attack of November 1988. The organization is a creation of the national security agency and performs the task of facilitating communications among various computer experts to focus their talent on preventing/containing attacks on computer systems. They have responded to over 14,000 requests both public and private since they were organized.
Attempt to profile the types of person who would pose a threat to computer systems security.
Keep in mind means, motive and opportunity.
Discuss this proposition. The software design objectives of flexibility in application, convenience of use, and efficiency of application create the security weaknesses in the commerce chain.
The proposition is incorrect for two reasons. This proposition is incorrect because software design is not the only source of weakness in the commerce chain. It is also incorrect because the objectives of the flexibility convenience and efficiency do not directly lead to security weaknesses. Not having security as a software design objectives does.
Discuss the threat to client machines.
Client machines are probable to active content. Active content includes programs that can be embedded within HTML documents or e-mail messages. These applications function as a Trojan horse and subject to client computer to any number security violations including release of confidential information and deletion of files on the computer.
Define intellectual property.
Intellectual property is the ownership of ideas and control of the tangible or virtual representation of those ideas. The design of a product is a form of intellectual property. Copyright protects intellectual property such as books, movies, articles, and recordings. Copyright in other intellectual property laws are important computer security as they provide the legal basis for protecting controlling much of the data and information contained on in within computer system.
What does copyright do?
Copyright protects intellectual property such as books, movies, articles and recordings.
Why are copyright and other intellectual property laws important to computer security?
They provide the legal basis for protecting controlling much of the data and information contained on in within computer system.
Write the lead paragraph for a corporate security policy.
The approach to our corporate computer security is three pronged: secrecy, integrity and necessity. Secrecy involves protection against unauthorized data disclosure, integrity is concerned with unauthorized data modification, and necessity refers to preventing data delays, denial or removal.
Explain why Web sites use cookies. The problem to cookie stall? What is a cookie containing? How larger cookies? Where are they stored? Use the online companion to help do your research.
Cookies helped the Internet to remember a response from one-page view to another. Cookies of commercial interest could contain customer order information in usernames/passwords from which credit card information could be accessible. View cookie Central website for wealth of information about them.
What is steganography? What does steganography have to do a security? Use the online companion to research question. Write at least 100 words about steganography.
Steganography describes information such as commands, which are hidden within another document or piece of information. This technology provides a way of hiding in encrypted files within another file so that a casual observer cannot attack that there is anything of importance within the containing file. The practices frequently turned a Trojan horse. In addition, this technology can identify computer files that contain redundant horse insignificant information he can improve the efficiency of computer memory or processing time.
Lists some of the Web server security risks. See the confined website where he can list the names of the directories on the site in print them.
Web server security risks involved high privilege, deceptive or unrestricted access to sensitive entry points such as those in the Web server and its software, or backend programs containing data, or common Gateway interface programs and utility programs residing on the server.
What security risks does the Internet pose? Are the risks mostly related to secrecy, or can a message’s integrity be compromised also?
The Internet is not secure. Secrecy and privacy threats exist, along with threats to integrity switches cyber vandalism and mask or reading. Intentional delays for interruption of service on the Internet constitute necessity threats to commercial organization.
Why are programs that run on client machines or on Web servers such as CGI scripts and Java programs security threats? Explain, in general way, how programs could breach security. Do JavaScript programs pose an equally serious security risk?
Programs that run on client machines or Web server, such as CGI script, are security threats because when you download a web page with embedded Java's scrip code it can execute on your client computer and destroy the hard disk. It can also discloses sensitive information to another Web server. This is not as greater threat as Java or Java applets because JavaScript cannot commence execution on its own, unlike the former two