Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Match with definition active attack adversary asset attack computer security countermeasure passive attack threat vulnerability a. An unauthorized attempt to gain information from a system

Match with definition

active attack

adversary

asset

attack

computer security

countermeasure

passive attack

threat

vulnerability

a.

An unauthorized attempt to gain information from a system (such as by eavesdropping) without affecting the systems operation.

b.

Anything that an owner considers valuable.

c.

An action taken to prevent or minimize the damage of a potential attack.

d.

An unauthorized attempt to modify some aspect of a systems operation.

e.

A threat carried out.

f.

A real or hypothetical entity that attacks or is a threat to a system.

g.

A flaw or weakness in a systems design, implementation, operation or management that could be exploited to violate the systems security policy.

h.

The protection of the integrity, availability, and confidentiality of information system resources.

i.

A potential for violation of security.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Building Database Driven Catalogs

Authors: Sherif Danish

1st Edition

0070153078, 978-0070153073

More Books

Students also viewed these Databases questions