CSC607 Security in Computing

Card Set Information

Author:
caldreaming
ID:
280239
Filename:
CSC607 Security in Computing
Updated:
2014-08-04 20:32:42
Tags:
security computing computer hacker spyware protecting malware attacks vulnerability threat confidentiality integrity availability hardware software data database internet network programs operating systems os adware
Folders:

Description:
This course examines the use of security vulnerabilities and threats in computer programs, operating systems, networks, and databases. The use of cryptography and other countermeasures to provide confidentiality, integrity, and availability is then evaluated in depth, from the perspectives of both technical effectiveness and ethics of users and developers.
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user caldreaming on FreezingBlue Flashcards. What would you like to do?


  1. What is meant by the CIA of computer security?
    Confidentiality, Integrity and Availability.
  2. What 3 things must a malicious attacker possess to be successful?

    Clue:  MOM
    • 1. Method
    • 2. Opportunity
    • 3. Motive
  3. Computer related systems have both ___________  and  ___________ weaknesses.
    Computer related systems have both theoretical and real weaknesses.
  4. A Trojan Horse is;

    A) A program that has a secret entry point
    B) A specific type of infection that can be used to spread from one computer to another
    C) A program that overly does one thing while covertly doing another
    D) In a program: code that makes information accessible to unauthorized people or programs
    C) A program that overly does one thing while covertly doing another
    (this multiple choice question has been scrambled)
  5. An Information Leak is;

    A) A program that has a secret entry point
    B) In a program: code that makes information accessible to unauthorized people or programs
    C) A specific type of infection that can be used to spread from one computer to another
    D) A program that overly does one thing while covertly doing another
    B) In a program: code that makes information accessible to unauthorized people or programs
    (this multiple choice question has been scrambled)
  6. A Trapdoor is;

    A) A program that overly does one thing while covertly doing another
    B) A specific type of infection that can be used to spread from one computer to another
    C) A program that has a secret entry point
    D) In a program: code that makes information accessible to unauthorized people or programs
    C) A program that has a secret entry point
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview