Chapter 14

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Name: Score:

28 Multiple choice questions

Term 1 of 28
Anticipation

Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers

Should not simply focus on its current operations but should predict possible future
events and changes that may affect its operations and resilience

If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system

Monitor both their internal operations and external environment for threats before they
arise

Term 2 of 28
Learning

Data is algorithmically scrambled

Incoming network packets are examined then accepted or rejected according to a set of
rules

Learning from experience.

Monitor both their internal operations and external environment for threats before they
arise

1 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 3 of 28
Scenarios or use cases for possible attacks are identified

Penetration simulation

Anticipation

Attack testing

Attack simulation

Definition 4 of 28
Organizations should adapt their processes and procedures in response to risks

Reliability

Monitoring

Responsiveness

Anticipation

Definition 5 of 28
Services that must always be maintained and components that are required to maintain these
services are identified

Attack simulation

Recognition

Critical service identification

Confidentiality of asset

2 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Term 6 of 28
Authentication

System should recognise early indications of system failure

Control where users of a system have to show that they are authorized to access the
system

System failures occur when the holes line up and all of the defenses fail.

All of the system services are restored and normal operation can continue

Term 7 of 28
Recovery

Illegal use of networked systems and one of the most serious problems facing our
society

If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system

If failure occurs, the recovery activity ensures that critical system services are restored
quickly so that users are not affected

Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers

Definition 8 of 28
All of the system services are restored and normal operation can continue

Monitoring

Resurgence

Recovery

Reinstatement

3 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Term 9 of 28
Asset classification

Organizations should adapt their processes and procedures in response to risks

Threat that data is not damaged but it is made available to people who should not have
access to it

Services that must always be maintained and components that are required to maintain
these services are identified

the organization's assets are examined and classified depending on how essential they
are to operations

Term 10 of 28
Resilience

All of the system services are restored and normal operation can continue

Judgment of how well that system can maintain the continuity of its critical services in
the presence of disruptive events, such as equipment failure and cyberattacks

System should recognise early indications of system failure

Control where users of a system have to show that they are authorized to access the
system

4 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Term 11 of 28
Monitoring

Most serious threat faced by networked systems but resilience is intended to cope with
failures

Illegal use of networked systems and one of the most serious problems facing our
society

Monitor both their internal operations and external environment for threats before they
arise

Incoming network packets are examined then accepted or rejected according to a set of
rules

Term 12 of 28
System understanding

System should recognise early indications of system failure

System failures occur when the holes line up and all of the defenses fail.

Review the goals of the system, its requirements and its architecture

All of the system services are restored and normal operation can continue

Term 13 of 28
Firewall

Incoming network packets are examined then accepted or rejected according to a set of
rules

Monitor both their internal operations and external environment for threats before they
arise

Illegal use of networked systems and one of the most serious problems facing our
society

Most serious threat faced by networked systems but resilience is intended to cope with
failures

5 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 14 of 28
Most serious threat faced by networked systems but resilience is intended to cope with
failures

Cyberattack

Attack Simulation

Cybercrime

Cyberstalking

Term 15 of 28
Confidentiality of asset

Services that must always be maintained and components that are required to maintain
these services are identified

Threats that aim to deny use of assets

Components that are both essential and compromisable by an attack are identified

Threat that data is not damaged but it is made available to people who should not have
access to it

Definition 16 of 28
Concerned with adverse external events that can lead to system failure

Responsive supply chain

Resilience engineering

System safety engineering

Continuous deployment

6 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 17 of 28
Engineers should assume that human errors will occur

Systems analysis

System understanding

Organizational hierarchy

Systems approach

Term 18 of 28
Encryption

Learning from experience.

Should not simply focus on its current operations but should predict possible future
events and changes that may affect its operations and resilience

Threats that aim to deny use of assets

Data is algorithmically scrambled

Term 19 of 28
Resistance

Illegal use of networked systems and one of the most serious problems facing our
society

Most serious threat faced by networked systems but resilience is intended to cope with
failures

If failure occurs, the recovery activity ensures that critical system services are restored
quickly so that users are not affected

If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system

7 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 20 of 28
System should recognise early indications of system failure

Anticipation

Authentication

Worsen With Promotion

Recognition

Term 21 of 28
Cybercrime

Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers

Most serious threat faced by networked systems but resilience is intended to cope with
failures

Illegal use of networked systems and one of the most serious problems facing our
society

Monitor both their internal operations and external environment for threats before they
arise

Term 22 of 28
Threat resistance

Identify possible resistance strategies for a threat

Engineers should assume that human errors will occur

each layer uses a different approach to deter attackers or trap failures

Threat where systems or data are damaged by a cyberattack

8 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 23 of 28
each layer uses a different approach to deter attackers or trap failures

Authentication

Firewall

Resistance

Defensive layer

Term 24 of 28
Survivability analysis

Threats that aim to deny use of assets

Concerned with adverse external events that can lead to system failure

Components that are both essential and compromisable by an attack are identified

Threat that data is not damaged but it is made available to people who should not have
access to it

Definition 25 of 28
System failures occur when the holes line up and all of the defenses fail.

Behavioral Pathology model

Human Systems model

Swiss Cheese model

Shell model

9 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...

Definition 26 of 28
Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers

Monitoring

Data Security

Cybersecurity

Authentication

Definition 27 of 28
Threats that aim to deny use of assets

Confidentiality of asset

Resistance

Availability of asset

Integrity of asset

Definition 28 of 28
Threat where systems or data are damaged by a cyberattack

Resistance

Confidentiality of asset

Availability of asset

Integrity of asset

Privacy Terms English (USA)

10 of 10 3/20/2024, 9:28 PM

You might also like