The records of each patient that is receiving or has received treatment resembles which security concept ?
A. Asset
B. Threat
C. Vulnerability
D. Control
Explanation: Asset is a system resource that has a value and has to be protected.
A. Asset
B. Threat
C. Vulnerability
D. Control
Explanation: Asset is a system resource that has a value and has to be protected.
A. True
B. False
Explanation: Security engineering is concerned with maintenance as well as development of such systems.
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D. Hazard detection and removal
Explanation: The system may include protection features that minimize the damage that may result from an accident.
A. Possibility of failure of data
B. Probability of failure of data
C. Possibility of failure on demand
D. Probability of failure on demand
A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..
A. Human error or mistake
B. System fault
C. System error
D. System failure
A. True
B. False
Explanation: The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs