• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/6

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

6 Cards in this Set

  • Front
  • Back
What is a THREAT to a computing system?
A set of circumstances that has the potential to cause loss or harm.
What does a computing system include?
A collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks.
Principle of Easiest Penetration:
An intruder must be expected to use any available means of penetration. It may not be the most obvious.
What does the Principle of Easiest Penetration imply?
That computer security specialists must consider all possible means of penetration. The penetration analysis must be done repeatedly, and especially whenever the system and its security change. Strengthening one aspect of a system may simply make another means of penetration more appealing to intruders.
A computer-based system has three separate but valuable components:
hardware, software, and data
A vulnerability is..
a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm.