You are on page 1of 3

1. Piece of code infect your device for damaging is …………………..

2. Software is set on your computer for spying on each action ………………


3. Weakness is in a system and can be exploit ………………
4. Computer security also known as ………………. And ……………………
5. Computer security aims for ………………............................... from ………. or ………
6. Security goals are divided into …………………..., ……………… and ………….. (CIA)
7. Confidentiality try to …………… information , keep information …………... ,
revealing only to ……………………
8. Weakness in security system that can be used to damage the system or steal
information is called …………………
9. Integrity is the information that can be …………. And try to detect or prevent
…………….. modification
10. Availability is ………….. to information and resources and services are always
available to ……………… users
11. ………... is a possible danger that might make use of a vulnerability
12. An assault on system security or any action compromises the security is ………..
13. Categories of vulnerabilities if:
Corrupted data mean loss of ……………………
Leaky mean loss of ……………………
Unavailable or very slow mean loss of ……………………..
14. Use of the vulnerability and threats is called ………………
15. Types of attack are …………… and …………..
16. ………….. attack affect on system operation while ……….. attack doesn’t affect on
system resources
17. ……………… one who is implements attack
18. Types of threats :
………………….. : is unauthorized access to information
this threat to (Confidentiality – Integrity – Availability – All)

………………….. : is acceptance of false data


This threat to (Confidentiality – Integrity – Availability – All)

………………….: is interruption of correct operation


This threat to (Confidentiality – Integrity – Availability – All)

……………….. : is unauthorized system control


This threat to (Confidentiality – Integrity – Availability – All)
19. Communication security try to prevent ………… or detect ……………
20. Write the types of attack on each diagram

21. An asset of the system is destroyed or becomes unavailable or disrupting traffic is


…………….. which is an attack on (Confidentiality – Integrity – Availability – All)
22. Faking data or unauthorized party inserts into a system is …………………. which is
an attack on (Confidentiality – Integrity – Availability – All)
23. Overhearing over a communication line is …………………… which is an attack on
(Confidentiality – Integrity – Availability – All)
24. Corrupting transmitted data or tampering or change data before it reach its
destination is ……………. which is an attack on (Confidentiality – Integrity –
Availability – All)
25. ………….. attack that the attacker obtaining information without any modification and
it is (easy – difficult) to detect
26. Categories of passive attack are …………………….………. And ………………
27. Categories if active attack are ……………….. , ……………… , …………….. and
……………
28. Release of message is also called ……………. While traffic analysis is called ………
29. …….…… refers to unauthorized access to data or interception of data
30. ….……… refers to obtaining some other of information by monitoring online traffic
31. In traffic analysis (Spoofing) the attacker can determine the ……..…… and ………...
Of the host
32. Modification of data is type of (Passive - Active) attack
33. When an entity pretends to be different entity is (Replay – Masquerade –
Modification of message) which is an attack on (Confidentiality – Integrity –
Availability – All)
34. Some portions of message are altered is (Replay – Masquerade – Modification of
message) which is an attack on (Confidentiality – Integrity – Availability – All)
35. Involves the passive capture of data and retransmission to produce an unauthorized
effect (Replay – Masquerade – Modification of message) which is an attack on
(Confidentiality – Integrity – Availability – All)
36. Snooping and traffic analysis (spoofing) are attack on (Confidentiality – Integrity –
Availability – All)
37. DOS is attack on (Confidentiality – Integrity – Availability – All)

You might also like