1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter14: System Administration
Section: Chapter Questions
Problem 8RQ
icon
Related questions
Question

1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.

2. An __________ attack attempts to alter system resources or affect their operation.

3. "The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" is the definition of _________ .

4. A loss of __________ is the disruption of access to or use of information or an information system.

5. Irreversible __________ mechanisms include hash algorithms and message authentication codes, which are used in digital signature and message authentication applications.

6. In the United States, the release of student grade information is regulated by the
__________ .

7. A loss of _________ is the unauthorized modification or destruction of information.

8. A _________ attack attempts to learn or make use of information from the system but does not affect system resources.

9. An _________ is a branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities.

10. Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication.


11. In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links.

12. __________ prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message.

13. Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network.

14. An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.

15. __________ is the use of a trusted third party to assure certain properties of a data
exchange.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of Security Models
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning