Any action that threatens one or more of the classic security services of confidentiality, integrity, availability, accountability, authenticity, and reliability in a system constitutes a(n) ________.

Fill in the blank(s) with the appropriate word(s).

incident

Computer Science & Information Technology

You might also like to view...

The ________ command is used to summarize and report results from separate worksheets

A) Summarize B) Group C) Consolidate D) Report

Computer Science & Information Technology

The overall responsibility of keeping an organization's software up to date ____.

A. depends upon the system manufacturer B. is the job of the Chief Security Officer C. is the job of the network administrator D. depends upon the organization

Computer Science & Information Technology