暗記メーカー

お問い合わせ
ログイン
MID 1_2
  • Zorro Roronoa

  • 問題数 56 • 9/17/2024

    記憶度

    完璧

    8

    覚えた

    21

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    are goals and constraints that affect the confidentiality,Integroty and availability

    security objectives

  • 2

    Also known as data confidentiality, this property means that information is not made available or disclosed to unauthorized individuals, entities, or processes. A loss of confidentiality is the unauthorized disclosure of information

    confidentiality

  • 3

    This term covers two (2) related concepts:

    integritu

  • 4

    ensures that data (both stored and is transmitted packets) and programs are changed only in a specified and authorized manner. A loss of data integrity is the unauthorized modification or destruction of information.

    data integrity

  • 5

    ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

    system integrity

  • 6

    ensures that systems work promptly and the service is not denied to authorized users. A loss of availability is the disruption

    availability

  • 7

    The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source

    authenticity

  • 8

    The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, it must be possible to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.

    accountability

  • 9

    defines a general security architecture that is useful to managers as a way of organizing the task of providing security • This standardized architecture defines security requirements.

    osi archi

  • 10

    -are any action that compromises the security of information owned by an organization. - attempt to gain unauthorized access to information resources or services, or cause harm or damage to information systems.

    security attacks

  • 11

    -are technical tools and techniques that are used to implement security services - A process that is designed to detect, prevent, or recover from a security attack.

    security mechanisms

  • 12

    is a processing or communication service that enhances the security of the data processing systems, and the information transfers of an organization.

    security service

  • 13

    are like eavesdropping or monitoring transmissions. The goal of the attacker is to obtain information that is being transmitted.

    passive attacks

  • 14

    this type, an attacker will monitor an unprotected communication medium like ,unencrypted email or telephone call and intercept it for sensitive information.

    release of message contents

  • 15

    In this type, an attacker monitors communication channels to collect a range of information, including human and machine identities, locations of these identities, and types of encryption used, if applicable.

    traffic analysis

  • 16

    involve some modification of stored or transmitted data or the creation of false data. There are four categories of active attacks: replay, masquerade, modification of messages, and denial of service.

    active attacks

  • 17

    takes place when one entity pretends to be a different entity. A masquerade attack usually includes one of the other forms of active attack.

    masquerade

  • 18

    involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

    replay

  • 19

    simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effec

    data modification

  • 20

    prevents or inhibits the normal use or management of communication facilities. Such an attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service).

    denial of service attack

  • 21

    security service service is concerned with ensuring that communication is authentic.

    authentication

  • 22

    SECURITY SERVICE is the ability to limit and control access to host systems and applications via communications links. To achieve this, each entity trying to gain access must first be identified or authenticated so that access rights can be tailored to the individual.

    access control

  • 23

    security service is the protection of transmitted data from passive attacks. Concerning the content of data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period.

    data confidentiality

  • 24

    security service ensures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays

    data integrity

  • 25

    security serveice prevents either a sender or a receiver from denying a transmitted message.

    non repudiation

  • 26

    security services means that a system or a system resource is accessible and usable upon demand by an authorized system entity, according to performance specifications for the system; that is, a system is available if it provides services according to the system design whenever users request them.

    availability service

  • 27

    refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps.

    online privacy

  • 28

    collect information directly from their customers, audience, or other types of users of their services.

    data collectors

  • 29

    compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.

    data brokers

  • 30

    category encompasses a broad range. One type of data user is a business that wants to target its advertisements and special offers. Other uses are fraud prevention and credit risk assessmen

    data users

  • 31

    are concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.

    web server security amd privacy

  • 32

    are concerned with web software, including any applications accessible via the Web.

    web application security and privacy

  • 33

    are concerned with the browser used from a client system to access a web server.

    web browser security and privacy

  • 34

    The execution of mobile applications on a mobile device may involve communication across several networks and interaction with some systems owned and operated by a variety of parties.

    mobile ecosystem

  • 35

    Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls.

    calls and wifi infastructure

  • 36

    Public app stores include native app stores; these are digital distribution services operated and developed by mobile OS vendors. For Android, the official app store is Google Play, and for iOS, it is simply called the App Store.

    public application stores

  • 37

    Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device

    device and os infastructure

  • 38

    Enterprise mobility management (EMM) is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).

    enterprise mobility systems

  • 39

    is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices as well as ensuring that deployed devices and their installed apps conform to the organization’s security requirements.

    administrator

  • 40

    in the organization that employs automated and/or human analyzers to evaluate the security characteristics of an app, including searching for malware, identifying vulnerabilities, and assessing risks.

    app testing facility

  • 41

    is to inspect reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements of the organization.

    aufitor

  • 42

    The goal of the project is to identify the most important technical and organizational privacy risks for web applications from the perspectives of both the user (data subject) and the provider (data owner).

    open web application security project

  • 43

    Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach

    web application vulnerabilities

  • 44

    Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality

    User side data leakage

  • 45

    Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.

    insufficient data breach response

  • 46

    Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.

    insufficient deletion of personal data

  • 47

    Not providing sufficient information describing how data are processed, such as their collection, storage, and processing.

    non transparent policies terms and condition

  • 48

    Collecting descriptive, demographic, or any other user-related data that are not needed for the system. Applies also to data for which the user did not provide consent.

    collection of data not reuired for primary purpose

  • 49

    Providing user data to a third party without obtaining the user’s consent. Sharing results either due to transfer or exchanging for monetary compensation or otherwise due to inappropriate use of third-party resources included in websites, such as widgets (e.g., maps, social networking buttons), analytics, or web bugs.

    sharing data for the third party

  • 50

    Using outdated, incorrect, or bogus user data and failing to update or correct the data.

    outdated personal data

  • 51

    Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness.

    missing insufficient session expiration

  • 52

    Failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failing to enforce mechanisms that limit the leaking surface (e.g., allowing to infer any user data out of the mechanics of web application operation).

    Insecure data transfer

  • 53

    Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system.

    mobile app privacy

  • 54

    Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping. Apps need to properly authenticate the remote server when connecting to prevent man-in- the-middle attacks and connection to malicious servers

    Insecure network communicatin

  • 55

    Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.

    web browser vulnerability

  • 56

    Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors. Software development by component or modules may be more efficient, and third-party libraries are routinely used across the industry.

    vulnerabilities in third party libraries