ExamGecko
Question list
Search
Search

Question 16 - ICS-SCADA Cyber Security discussion

Report
Export

Which component of the IT Security Model is attacked with masquerade?

A.
Integrity
Answers
A.
Integrity
B.
Availability
Answers
B.
Availability
C.
Confidentiality
Answers
C.
Confidentiality
D.
Authentication
Answers
D.
Authentication
Suggested answer: D

Explanation:

A masquerade attack involves an attacker pretending to be an authorized user of a system, thus compromising the authentication component of the IT security model. Authentication ensures that the individuals accessing the system are who they claim to be. By masquerading as a legitimate user, an attacker can bypass this security measure and gain unauthorized access to the system.

Reference:

William Stallings, 'Security in Computing'.

asked 18/09/2024
Stian Godoe
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first