Is a subject or objects ability to use manipulate modify or affect another subject or object?

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Terms in this set (15)

access

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

physical design

During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.

True

A breach of possession may not always result in a breach of confidentiality.

exploit

A technique used to compromise a system is known as a(n) ___________.

True

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

​information security

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

logical

The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

False

The physical design is the blueprint for the desired solution.

DevOps

An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.

All of the above

Data owners
Data custodians
Data users

Which of the following is a valid type of role when it comes to data ownership?

direct

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

NSTISSI No. 4011

_________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

False

Using a methodology will usually have no effect on the probability of success.

vulnerabilities

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

False

E-mail spoofing involves sending an e-mail message with a harmful attachment

Recommended textbook solutions

Is a subject or objects ability to use manipulate modify or affect another subject or object?

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

Is a subject or objects ability to use manipulate modify or affect another subject or object?

Elementary Number Theory

7th EditionDavid Burton

776 solutions

Is a subject or objects ability to use manipulate modify or affect another subject or object?

Introduction to Real Analysis

4th EditionDonald R. Sherbert, Robert G. Bartle

842 solutions

Is a subject or objects ability to use manipulate modify or affect another subject or object?

Fundamentals of Complex Analysis with Applications to Engineering, Science & Mathematics, International

3rd EditionArthur David Snider, Edward B. Saff

772 solutions

Sets with similar terms

Information Security (Exam 1, Chapter 1)

37 terms

nikkitucker

Chapter 1: Introduction to Information Security

89 terms

Mowriah

Principles of Information Security, 5th Edition- C…

45 terms

misscarswell

Intro to Information Security

55 terms

Theresa0425

Sets found in the same folder

Chapter 5 - ITSY 1300

50 terms

abbyoatman

CH 2

91 terms

catcode

Information Security Chapter 2

75 terms

divyae

ch 3

83 terms

catcode

Other sets by this creator

Quiz 8

20 terms

adlacey

Quiz 7

10 terms

adlacey

Quiz 5

42 terms

adlacey

Quiz 4

22 terms

adlacey

Verified questions

ADVANCED MATH

Chris walks halfway along a 100-m track in 1 min, then half of the remaining distance in the next minute, then half of the remaining distance in the third minute, and so on. a) How far has Chris walked after 10 min? b) Will Chris get to the end of the track? Explain. Include a table of values and a graph to support your explanation. c) Write an equation to model this situation.

Verified answer

ADVANCED MATH

An electronics firm has a contract to deliver the following number of radios during the next three months; month 1, 200 radios; month 2, 300 radios; month 3, 300 radios. For each radio produced during months 1 and 2, a $10 variable cost is incurred; for each radio produced during month 3, a$12 variable cost is incurred. The inventory cost is $1.50 for each radio in stock at the end of a month. The cost of setting up for production during a month is$250. Radios made during a month may be used to meet demand for that month or any future month. Assume that production during each month must be a multiple of 100. Given that the initial inventory level is 0 units, use dynamic programming to determine an optimal production schedule.

Verified answer

ADVANCED MATH

Each of the following passages contains a single argument. Using the letters “P” and “C,” identify the premises and conclusion of each argument, writing premises first and conclusion last. List the premises in the order in which they make the most sense (usually the order in which they occur), and write both premises and conclusion in the form of separate declarative sentences. Indicator words may be eliminated once premises and conclusion have been appropriately labeled. Neither a borrower nor lender be For loan oft loses both itself and friend, And borrowing dulls the edge of husbandry.

Verified answer

ADVANCED MATH

Represent each of the primes 113, 229, and 373 as a sum of two squares.

Verified answer

Other Quizlet sets

A&P Lecture Test 2

101 terms

jmurray993

Online Chapter History Quiz 17

20 terms

Jessica2952

hosa- Chapter 8 test

34 terms

viltzchl000

Med Neuro final exam 3

11 terms

suxinhaku

Related questions

QUESTION

Which type of planning is the primary tool in determining the long-term direction taken by an organization?

15 answers

QUESTION

In your introduction to SAP exercises, you learned about transaction codes and you reviewed three transaction codes about sales orders: VA01, VA02, and VA03. What does VA01 stand for?

4 answers

QUESTION

What was the software called that was found in most early computers from the 1950s into the 1970s and is considered a precursor to the modern operating system?

15 answers

QUESTION

A personal information manager helps users store, organize, and retrieve information about customers and prospects, and schedule and manage appointments.

4 answers

What is subject and object of an attack?

The term " Subject of an Attack " means that , computers can be used as a tool to conduct an attack. i.e. Hacking. " Object of an Attack " means that, computer can be the entity or target that can attacked by hackers.

Are events or circumstances that have the potential to adversely affect operations and assets?

Threat Any event or circumstance that has the potential to adversely affect operations and assets. The term threat source is commonly used interchangeably with the more generic term threat.

Can be a documented process to take advantage of a vulnerability or exposure usually in software that is either inherent in the software or created by the attacker?

Or, an exploit can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or created by the attacker. Exploits make use of existing software tools or custom-made software components.

What is a technique used to compromise a system?

An exploit is a technique or mechanism used to compromise a system. A vulnerability is an identified weakness of a controlled system in which necessarycontrols are not present or are no longer effective.An attack is the use of an exploit to achieve the compromise of a controlled system.