Professional Documents
Culture Documents
Chapter 14
Chapter 14
Chapter 14
Name: Score:
Term 1 of 28
Anticipation
Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers
Should not simply focus on its current operations but should predict possible future
events and changes that may affect its operations and resilience
If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system
Monitor both their internal operations and external environment for threats before they
arise
Term 2 of 28
Learning
Incoming network packets are examined then accepted or rejected according to a set of
rules
Monitor both their internal operations and external environment for threats before they
arise
1 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 3 of 28
Scenarios or use cases for possible attacks are identified
Penetration simulation
Anticipation
Attack testing
Attack simulation
Definition 4 of 28
Organizations should adapt their processes and procedures in response to risks
Reliability
Monitoring
Responsiveness
Anticipation
Definition 5 of 28
Services that must always be maintained and components that are required to maintain these
services are identified
Attack simulation
Recognition
Confidentiality of asset
2 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Term 6 of 28
Authentication
Control where users of a system have to show that they are authorized to access the
system
System failures occur when the holes line up and all of the defenses fail.
All of the system services are restored and normal operation can continue
Term 7 of 28
Recovery
Illegal use of networked systems and one of the most serious problems facing our
society
If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system
If failure occurs, the recovery activity ensures that critical system services are restored
quickly so that users are not affected
Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers
Definition 8 of 28
All of the system services are restored and normal operation can continue
Monitoring
Resurgence
Recovery
Reinstatement
3 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Term 9 of 28
Asset classification
Threat that data is not damaged but it is made available to people who should not have
access to it
Services that must always be maintained and components that are required to maintain
these services are identified
the organization's assets are examined and classified depending on how essential they
are to operations
Term 10 of 28
Resilience
All of the system services are restored and normal operation can continue
Judgment of how well that system can maintain the continuity of its critical services in
the presence of disruptive events, such as equipment failure and cyberattacks
Control where users of a system have to show that they are authorized to access the
system
4 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Term 11 of 28
Monitoring
Most serious threat faced by networked systems but resilience is intended to cope with
failures
Illegal use of networked systems and one of the most serious problems facing our
society
Monitor both their internal operations and external environment for threats before they
arise
Incoming network packets are examined then accepted or rejected according to a set of
rules
Term 12 of 28
System understanding
System failures occur when the holes line up and all of the defenses fail.
Review the goals of the system, its requirements and its architecture
All of the system services are restored and normal operation can continue
Term 13 of 28
Firewall
Incoming network packets are examined then accepted or rejected according to a set of
rules
Monitor both their internal operations and external environment for threats before they
arise
Illegal use of networked systems and one of the most serious problems facing our
society
Most serious threat faced by networked systems but resilience is intended to cope with
failures
5 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 14 of 28
Most serious threat faced by networked systems but resilience is intended to cope with
failures
Cyberattack
Attack Simulation
Cybercrime
Cyberstalking
Term 15 of 28
Confidentiality of asset
Services that must always be maintained and components that are required to maintain
these services are identified
Components that are both essential and compromisable by an attack are identified
Threat that data is not damaged but it is made available to people who should not have
access to it
Definition 16 of 28
Concerned with adverse external events that can lead to system failure
Resilience engineering
Continuous deployment
6 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 17 of 28
Engineers should assume that human errors will occur
Systems analysis
System understanding
Organizational hierarchy
Systems approach
Term 18 of 28
Encryption
Should not simply focus on its current operations but should predict possible future
events and changes that may affect its operations and resilience
Term 19 of 28
Resistance
Illegal use of networked systems and one of the most serious problems facing our
society
Most serious threat faced by networked systems but resilience is intended to cope with
failures
If failure occurs, the recovery activity ensures that critical system services are restored
quickly so that users are not affected
If symptoms of a problem are detected early, then resistance strategies may be used to
reduce the probability that the system will fail
Focus on isolating critical parts of the system
7 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 20 of 28
System should recognise early indications of system failure
Anticipation
Authentication
Recognition
Term 21 of 28
Cybercrime
Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers
Most serious threat faced by networked systems but resilience is intended to cope with
failures
Illegal use of networked systems and one of the most serious problems facing our
society
Monitor both their internal operations and external environment for threats before they
arise
Term 22 of 28
Threat resistance
8 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 23 of 28
each layer uses a different approach to deter attackers or trap failures
Authentication
Firewall
Resistance
Defensive layer
Term 24 of 28
Survivability analysis
Concerned with adverse external events that can lead to system failure
Components that are both essential and compromisable by an attack are identified
Threat that data is not damaged but it is made available to people who should not have
access to it
Definition 25 of 28
System failures occur when the holes line up and all of the defenses fail.
Shell model
9 of 10 3/20/2024, 9:28 PM
[CS140] Chapter 14 - Resilience Engineering | Quizlet https://quizlet.com/231806923/test?answerTermSides=6&promptTermS...
Definition 26 of 28
Sociotechnical issue covering all aspects of ensuring the protection of citizens etc from
threats that arise in computers
Monitoring
Data Security
Cybersecurity
Authentication
Definition 27 of 28
Threats that aim to deny use of assets
Confidentiality of asset
Resistance
Availability of asset
Integrity of asset
Definition 28 of 28
Threat where systems or data are damaged by a cyberattack
Resistance
Confidentiality of asset
Availability of asset
Integrity of asset
10 of 10 3/20/2024, 9:28 PM