Question: Match the terms with their definitions: audit ( operational ) , attack, access control, asymmetric cryptography, access control list, audit ( forensic ) . Definions:
Match the terms with their definitions: audit operational attack, access control, asymmetric cryptography, access control list, audit forensic Definions: Mechanism authorizing identified user to use information resource., A mechanism recording selected system events and activity, whether planned, authorized, successful or otherwise, meant to provide the ability to analyze the system for compliance or errors, and support reviews., An activity consciously intended to compromise an information asset, whether to immediately damage confidentiality, integrity, or availability, to prepare later actions in that regard, or to perform lateral attacks on other information assets., Mechanism identifying users authorized for that asset, How an attacker can get into your system, A means of generating data for security tests, Cryptography in which encryption and decryption are performed using different keys., An independent review and examination of a system's records and activities to determine the adequacy of system controls,ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
