Which component of the IT Security Model is attacked with masquerade?

Which component of the IT Security Model is attacked with masquerade?
A . Integrity
B . Availability
C . Confidentiality
D . Authentication

Answer: D

Explanation:

A masquerade attack involves an attacker pretending to be an authorized user of a system, thus compromising the authentication component of the IT security model. Authentication ensures that the individuals accessing the system are who they claim to be. By masquerading as a legitimate user, an attacker can bypass this security measure and gain unauthorized access to the system.

Reference: William Stallings, "Security in Computing".

Latest ICS-SCADA Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments