Review Question (ATTTKT)
Review Question (ATTTKT)
Review Question (ATTTKT)
Threat source is commonly used interchangeably with the more generic term
threat. Technically there are two terms in order to simplify discussion will continue
to use the term threat to describe the threat sources while in Threat Agent who
causes or attempts to cause harm to an organization
1. What is the difference between a threat agent and a threat?
Threat source is commonly used interchangeably with the more generic term
threat. Technically there are two terms in order to simplify discussion will continue
to use the term threat to describe the threat sources while in Threat Agent who
causes or attempts to cause harm to an organization
1.What is the difference between a threat agent and a threat?
Threat source is commonly used interchangeably with the more generic term
threat. Technically there are two terms in order to simplify discussion will
continueto use the term threat to describe the threat sources while in Threat
Agent who causes or attempts to cause harm to an organization.
2. What is the difference between vulnerability and exposure?
Vulnerability is an ability weak point in an asset or its protective manipulate
system(s). Some examples of vulnerabilities are a flaw in a software program
package, an unprotected system port, and an unlocked door while exposure
means is the metric based on how a threat steals data and what it does with the
stolen data. This field is associated with information theft. Most, if not all,
malware contains data theft routines. These routines steal specific information.
2. What is the difference between vulnerability and exposure?
Vulnerability is an ability weak point in an asset or its protective manipulate
system(s). Some examples of vulnerabilities are a flaw in a software program
package, an unprotected system port, and an unlocked door while exposure
means is the metric based on how a threat steals data and what it does with the
stolen data. This field is associated with information theft. Most, if not all,
malware contains data theft routines. These routines steal specific information.
2.What is the difference between vulnerability and exposure?
Vulnerability is an ability weak point in an asset or its protective manipulate
system(s). Some examples of vulnerabilities are a flaw in a software
program package, an unprotected system port, and an unlocked door while
exposure means is the metric based on how a threat steals data and what it
does with the stolen data. This field is associated with information theft.
Most, if not all, malware contains data theft routines. These routines steal
specific information
3.What is a loss in the context of information security?
4. What type of security was dominant in the early years of computing?
Physical Security only data and connection was not focused on.
5.What are the three components of the C.I.A. triad?
What are they used for?
The confidentiality, integrity, and availability of information is crucial to the
operation of a business, and the CIA triad segments these three ideas into
separate focal points. This differentiation is helpful because it helps guide
security teams as they pinpoint the different ways in which they can address
each concern.
Confidentiality involves the efforts of an organization to make sure data is
kept secret or private. To accomplish this, access to information must be
controlled to prevent the unauthorized sharing of data—whether intentional
or accidental. A key component of maintaining confidentiality is making
sure that people without proper authorization are prevented from accessing
assets important to your business. Conversely, an effective system also
ensures that those who need to have access have the necessary privileges.
Integrity involves making sure your data is trustworthy and free from
tampering. The integrity of your data is maintained only if the data is
authentic, accurate, andreliable.