CAS CS 54664

subject Type Homework Help
subject Pages 5
subject Words 411
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Security flaws occur as a consequence of sufficient checking and validation of data and
error codes in programs.
A message authentication code is a small block of data generated by a secret key and
appended to a message.
ISO details a model process for managing information security that comprises the
following steps: plan, do, ________, and act.
The fields preceding the MSDU field are referred to as the _________.
page-pf2
The ticket-granting ticket is encrypted with a secret key known only to the AS and the
TGS.
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated
interactions.
Computers as targets is a form of crime that involves an attack on data integrity, system
integrity, data confidentiality, privacy, or availability.
page-pf3
An alternative to each server being required to confirm identities of clients who request
service is to use an _______ that knows the passwords of all users and stores them in a
centralized database.
A person that becomes statically charged can damage electronic equipment by an
electric discharge.
IT security management has evolved considerably over the last few decades due to the
rise in risks to networked systems.
A(n) ________ is a battery backup unit that can maintain power to processors,
monitors, and other equipment and can also function as a surge protector, power noise
filter, and an automatic shutdown device.
page-pf4
Detecting and reacting to incidents is not a function of IT security management.
The authentication server shares a unique secret key with each server.
Protection of the audit trail involves both integrity and confidentiality.
page-pf5
A __________ uses multiple methods of infection or propagation to maximize the
speed of contagion and the severity of the attack.
________ refers to a technology that provides an abstraction of the computing
resources that run in a simulated environment.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.