Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/6

Click to flip

6 Cards in this Set

  • Front
  • Back
What is a THREAT to a computing system?
A set of circumstances that has the potential to cause loss or harm.
What does a computing system include?
A collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks.
Principle of Easiest Penetration:
An intruder must be expected to use any available means of penetration. It may not be the most obvious.
What does the Principle of Easiest Penetration imply?
That computer security specialists must consider all possible means of penetration. The penetration analysis must be done repeatedly, and especially whenever the system and its security change. Strengthening one aspect of a system may simply make another means of penetration more appealing to intruders.
A computer-based system has three separate but valuable components:
hardware, software, and data
A vulnerability is..
a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm.