An event or attempt to gain unauthorized access or use of an asset is called what?

Prepare for the ISACA IT Risk Fundamentals Test. Find flashcards and multiple choice questions, complete with hints and explanations. Ace your exam with confidence!

Multiple Choice

An event or attempt to gain unauthorized access or use of an asset is called what?

Explanation:
In information security, an attack is a deliberate attempt to access or use an asset without authorization. It refers to the action or event where someone tries to break through defenses or exploit vulnerabilities to compromising confidentiality, integrity, or availability. This distinguishes it from an audit (a review activity), a control (a safeguard put in place to prevent or detect such actions), and a consequence (the impact if a threat is realized). Examples include phishing emails designed to steal credentials, brute-force login attempts, or delivering malware.

In information security, an attack is a deliberate attempt to access or use an asset without authorization. It refers to the action or event where someone tries to break through defenses or exploit vulnerabilities to compromising confidentiality, integrity, or availability. This distinguishes it from an audit (a review activity), a control (a safeguard put in place to prevent or detect such actions), and a consequence (the impact if a threat is realized). Examples include phishing emails designed to steal credentials, brute-force login attempts, or delivering malware.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy