threat Correct Ans-an object, person, or other entity which represents a danger to assets
threat agent Correct Ans-a person or system who uses exploits to instantiate threats
vulnerability Correct Ans-a system weakness or fault which decreases security
C-2 Security Correct Ans-discretionary access control
individual authentication
object reuse
audit trails
resource isolation
private files
discretionary access control Correct Ans-must be possible to grant/deny access to specific
resources to named users or groups of users
individual authentication Correct Ans-user must identify themselves in a unique manner
object reuse Correct Ans-memory and disk must not be readable after delete
, CSE 4471 Midterm Exam with Complete Solutions
audit trails Correct Ans-audit-able actions must associate with user, access to audit data
must be limited to admins
resource isolation Correct Ans-systems protected from external modification of running
operating system or stored system files
private files Correct Ans-security-related events accessible only by systems admin but sys
admin cannot read other users files
Security Development Life-cycle (SDLC) Correct Ans-evolution->analyze->design-
>implementation->testing
Evolution Correct Ans-(Investigation)
Determine goals of security project
scope and define project
determine organizational feasibility
Analyze Correct Ans-enumerate specific threat impacts
analyze potential legal issues
risk evaluation and management
Design Correct Ans-business continuity plan
, CSE 4471 Midterm Exam with Complete Solutions
incident response plan
disaster recovery plan
implementation plan
component selection
success criteria
Implementation Correct Ans-build/buy components
integrate
educate user community
Testing Correct Ans-evaluate daily-use tools
feed-back from users
simulated business disruption
simulated natural disaster
measure results vs success criteria
Needs of the business Correct Ans-protect organization's ability to function
protect data and information assets
enable safe application operation
safeguard other technology assets
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.