Any action that threatens one or more of the classic security services of confidentiality, integrity, availability, accountability, authenticity, and reliability in a system constitutes a(n) ________.
Fill in the blank(s) with the appropriate word(s).
incident
Computer Science & Information Technology
You might also like to view...
The ________ command is used to summarize and report results from separate worksheets
A) Summarize B) Group C) Consolidate D) Report
Computer Science & Information Technology
The overall responsibility of keeping an organization's software up to date ____.
A. depends upon the system manufacturer B. is the job of the Chief Security Officer C. is the job of the network administrator D. depends upon the organization
Computer Science & Information Technology