CMCS 61279

subject Type Homework Help
subject Pages 5
subject Words 402
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Depending on the application, user authentication on a biometric system involves either
verification or identification.
Security implementation involves four complementary courses of action: prevention,
detection, response, and _________.
The __________ is a pair of keys that have been selected so that if one is used for
encryption, the other is used for decryption.
Misappropriation and misuse are attacks that result in ________ threat consequences.
page-pf2
The selection of recommended controls is not guided by legal requirements.
Identifiers should be assigned carefully because authenticated identities are the basis for
other security services.
A __________ is a mapping between a user and an activated subset of the set of roles to
which the user is assigned.
page-pf3
__________ anomaly watches for unusual traffic activities, such as a flood of UDP
packets or a new service appearing on the network.
A _________ on an organization's IT systems identifies areas needing treatment.
IP-level security encompasses three functional areas: authentication, confidentiality, and
_________.
Configuration information in Windows systems is centralized in the _______, which
forms a database of keys and values.
page-pf4
A variant where the attacker includes malicious script content in data supplied to a site
is the __________ vulnerability.
An encryption scheme is _________ if the cost of breaking the cipher exceeds the value
of the encrypted information and/or the time required to break the cipher exceeds the
useful lifetime of the information.
_________ matching scans incoming packets for specific byte sequences (the signature)
stored in a database of known attacks.
page-pf5
Traditional RBAC systems define the access rights of individual users and groups of
users.
The primary role of the personal firewall is to deny unauthorized remote access to the
computer.
The basic elements of access control are: subject, __________, and access right.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.