Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 7, Problem 15RQ

Explanation of Solution

System attack surface:

  • When functions and features of the system get exposed easily to the unauthorized user is called as system attack surface.
  • Unauthorized user or attacker attacks the system using attack protocol by following a logical sequence of steps.

Reason for the system to minimize the function and features that are exposed to un...

Blurred answer
Students have asked these similar questions
A firewall's operation and possible implementation are both explained in great detail.
An attack that degrades a system is referred to as
Why a DoS attack is useful as a stress test?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning