Question List for "Introduction to Security: Operations and Management"

  Topics Views Last post
Skills and Trades » A person who illegally accesses restricted computer databases is known as a ________. New
Started by jon_i
84 Aug 11, 2019
Skills and Trades » The CIA Triad use the goals of confidentiality, integrity, and ________ to ensure information ... New
Started by ashley
100 Aug 11, 2019
Skills and Trades » Compartments refer to the subject matter of the information or object(s) that the user is given access to. New
Started by j.rubin
87 Aug 11, 2019
Skills and Trades » Traditionally, organizations have had three public methods to protect their intellectual property: ... New
Started by kwoodring
108 Aug 11, 2019
Skills and Trades » Network Segmentation involves securing, isolating, and separating vital network components into sub ... New
Started by Pea0909berry
81 Aug 11, 2019
Skills and Trades » A Denial of Service Attack occurs when the perpetrator(s) use a large network of computers that have ... New
Started by tth
105 Aug 11, 2019
Skills and Trades » Malicious code attacks occur when individuals (usually hackers) gain access to user and/or computer ... New
Started by neverstopbelieb
157 Aug 11, 2019
Skills and Trades » Technical controls are nonphysical means of denying access. They include firewalls, antirust ... New
Started by sam.t96
73 Aug 11, 2019
Skills and Trades » Social engineering involves nontechnical and nonphysical means to steal information. New
Started by jCorn1234
94 Aug 11, 2019
Skills and Trades » Most criminal prosecutions under the Economic Espionage Act involve Section 1831 violations. New
Started by BrownTown3
66 Aug 11, 2019