



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A list of definitions and answers related to information security concepts. It covers various aspects of security, including threats, vulnerabilities, attacks, and safeguards. Useful for understanding basic information security terminology and concepts.
Typology: Exams
1 / 7
This page cannot be seen from the preview
Don't miss anything!
Spoofing attack - ANSWERS-A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access
Threat - ANSWERS-Anything (man made or act of nature) that has the potential to cause harm
Trojan Horse - ANSWERS-A program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another, usually set up a backdoor
Virus - ANSWERS-A self replicating program that spreads by inserting copies of itself into other executable code or documents
Vulnerability - ANSWERS-A weakness that could be used to endanger or cause harm to an informational asset
The process of confirming the truth of an attribute of a datum or entity - ANSWERS-Authentication
The process of verifying that a particular identity are permitted to do in a system - ANSWERS-Authorization
The information must be available to authorized entity - ANSWERS-Availability
Sending of unsolicited messages over Bluetooth to Bluetooth enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name Iield (i.e. for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol. - ANSWERS-Bluejacking
Computer Forensics and Investigation is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics. The goal of computer forensics is to explain the current state of a digital artifact - ANSWERS-Computer Forensics
Individuals must be identifiable and must be held responsible for their actions by tracking their activities - ANSWERS-Accountability
The process of mapping a known identity to an unknown entity so as to make it known - ANSWERS-Identification
A measure of the scale and magnitude of an incident or problem - ANSWERS- Impact
A process is to restore a normal service operation as quickly as possible and to minimize the impact on business operations - ANSWERS-Incident Management
Preventing the modification of information to unauthorized individuals or systems
A software program designed to record (log) every keystroke on the machine on which it runs - ANSWERS-Keyloggers
The use of multiple controls in a series - ANSWERS-Layering
Enforce someone cannot deny what he / she has done - ANSWERS-Non- repudiation
The process of simulating attacks on a network and its systems - ANSWERS- Penetration Testing
A slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems, like equipment and systems connected to public telephone networks - ANSWERS-Phreaking
The likelihood that something bad will happen that causes harm to an informational asset (or the loss of the asset). Risk = threat + vulnerability - ANSWERS-Risk
A toolkit for hiding the fact that a computer's security has been compromised - ANSWERS-Rootkit
Anything that removes a vulnerability or protects against one or more speciIic threats - ANSWERS-Safeguards
Security Exploit - ANSWERS-A prepared application that takes advantage of a known weakness
Security Policy - ANSWERS-A deIinition of what it means to be secure for a system, organization or other entity which is high level definiton of secure behaviour
Security Procedures - ANSWERS-A detailed, step by step how to document that describes the exact actions necessary to implement a speciIic security mechanism, control, or solution
Worm - ANSWERS-A self replicating program that does not create copies of itself on one system: it propagates through computer networks