Sie sind auf Seite 1von 1

Computer System Security tutorial

Security Computing
1. What are different methods of control for computer security?
2. Define the following terms:
a. the principle of weakest link
b. Risk
c. Penetration
d. attack and attacker
3. Give an example of four categories of attacks.
4. List at least three kinds of harm a company could experience from electronic espionage
or unauthorized viewing of confidential company materials.
5. Describe an example (other than the one mentioned in this chapter) of data whose
confidentiality has a short timeliness, say, a day or less. Describe an example of data
whose confidentiality has a timeliness of more than a year.
6. List three types of controls and give an example of each.
7. List and define the three components or conditions necessary for a successful attack.

Das könnte Ihnen auch gefallen