1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.
1. A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption
2. An __________ attack attempts to alter system resources or affect their operation.
3. "The protection afforded to an automated
4. A loss of __________ is the disruption of access to or use of information or an information system.
5. Irreversible __________
6. In the United States, the release of student grade information is regulated by the
__________ .
7. A loss of _________ is the unauthorized modification or destruction of information.
8. A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
9. An _________ is a branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities.
10. Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication.
11. In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links.
12. __________ prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message and when a message is received, the sender can prove that the alleged receiver in fact received the message.
13. Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network.
14. An __________ is an assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.
15. __________ is the use of a trusted third party to assure certain properties of a data
exchange.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps