Question: Name: Shawn Date: 1 9 Feb 2 4 Cybersecurity Something or someone that may result in harm to asset Probability of a threat exploiting a
Name:
Shawn
Date:
Feb
Cybersecurity
Something or someone that may result in harm to asset
Probability of a threat exploiting a vulnerability
A Risk
management
B Exploit
C threat
D Fault
Tool or technique that takes advantage of a vulnerability
tolerance
Process of identifying, assessing, and reducing risk to an acceptable level
E Audit
Security feature designed to restrict who has access to a network, IS or data.
F Access
control
The process of generating, recording, and reviewing a chronological record of system events to
G Plaintext
determine their accuracy
Transforming data into scrambled code to protect it from being understood by unauthorized users
H Firewall
Readable text
Encryption
Encrypted text
J
Vulnerability
Software or hardware device that controls access to a private network from a public network
K risk
Internet by analyzing data packets entering or exiting it
L Ciphertext
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
