A _________ prevents or inhibits the normal use or management of system facilities.
masquerade attack
denial of service attack
traffic encryption attack
passive attack
An one-time-use authentication token need only be protected from access by unauthorised users until it has been used by the authorised party. This is an example of the ___________.
Effectiveness Principle
Timeliness Principle
Weakest Link Principle
Energy Principle
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _________
countermeasure
adversary
vulnerability
risk
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
unauthorized disclosure
disruption
deception
usurpation
A loss of _________ is the unauthorised disclosure of information.
confidentiality
availability
authenticity
integrity
The assurance that data received are exactly as sent by an authorised entity is __________.
availibility
A __________ is any action that compromises the security of information owned by an organization.
security mechanism
security policy
security attack
security service
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorised manipulation of the system.
system integrity
data integrity