Preview

System Security

Better Essays
Open Document
Open Document
1174 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
System Security
Definition of the Following terms: 1. System Security a system that enforces boundaries between computer networks 2. Threat
A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more. Threats are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. They can put individuals’ computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. Threats can include everything from viruses, trojans, back doors to outright attacks from hackers. Often, the term blended threat is more accurate, as the majority of threats involve multiple exploits. For example, a hacker might use a phishing attack to gain information about a network and break into a network. 3. Exposure
An exposure is a security-related situation, event or fact that may be considered vulnerability by some people but not by others.
An instance of vulnerability in which losses may result from the occurrence of one or more attacks 4. Vulnerability
Vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. 5. Risk
This relatively new term due to an increasing awareness that information security is simply

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The time between each of these areas or, the vulnerability’s lifecycle is divided into three risk areas. These areas are listed below and explained briefly.…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (“Common Cybersecurity,” 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Manage Risk

    • 7591 Words
    • 24 Pages

    3.Food industry: The possibility that due to a certain hazard in food there will be an negative effect to a certain magnitude.…

    • 7591 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Pys-270 Dq 1&2 Wk1

    • 756 Words
    • 4 Pages

    * Danger- The possibility of suffering harm, or injury; Exposure or vulnerability to harm or risk ("Merriam-Webster Dictionary", 2013) Example: A person who has threaten or tried to commit suicide.…

    • 756 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 3 - P1 P2 M1

    • 2611 Words
    • 9 Pages

    When working in a health and social environment, it is important that the surrounding nature is safe and free of any potential harm. A hazard is something that can possibly cause you this danger. Hazards range from something being misplaced to a broken object. When identifying a hazard, risk assessments would take place to find out the best and quickest solution to prevent any danger. The definition of a risk is the probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 2611 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Manage Risk

    • 6382 Words
    • 19 Pages

    a) Risk: A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 6382 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Physical Security

    • 2606 Words
    • 11 Pages

    Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). The notion implies that a choice having an influence on the outcome exists (or existed). Potential losses themselves may also be called "risks". Almost any human endeavor carries some risk, but some are much more risky than others.…

    • 1077 Words
    • 5 Pages
    Better Essays