CDA 91281

subject Type Homework Help
subject Pages 5
subject Words 385
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The education and experience learning level provides the foundation for subsequent
training by providing a universal baseline of key security terms and concepts.
A __________ firewall controls the traffic between a personal computer or workstation
on one side and the Internet or enterprise network on the other side.
There are two general approaches to attacking a symmetric encryption
scheme: cryptanalytic attacks and __________ attacks.
A __________ language provides a uniform interface to the database for users and
applications.
page-pf2
Two of the most important applications of public-key encryption are digital signatures
and key management.
The ________ audit process should be conducted on new IT systems and services once
they are implanted; and on existing systems periodically, often as part of a wider,
general audit of the organization or whenever changes are made to the organization's
security policy.
The principal objectives of computer security are to prevent unauthorized users from
gaining access to resources, to prevent legitimate users from accessing resources in an
unauthorized manner, and to enable legitimate users to access resources in an
authorized manner.
page-pf3
Privacy is broken down into four major areas: anonymity, unlinkability, unobservability,
and _________.
The group of users, sites, networks, or organizations served by the CSIRT is a(n)
_______.
The _________ (RFC 4766) document defines requirements for the Intrusion Detection
Message Exchange Format (IDMEF).
Voice pattern, handwriting characteristics, and typing rhythm are examples of
page-pf4
__________ biometrics.
Snort Inline adds three new rule types: drop, reject, and _________.
The ________ IP address is the IP address of the system that originated the IP packet.
Unlike ECB and CBC modes, ________ mode requires only the implementation of the
encryption algorithm and not the decryption algorithm.
page-pf5
An obvious security risk is that of impersonation.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.