100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Cyber Security Fundamentals – Core Concepts, Threats, and Protection Techniques | Lecture Summary

Puntuación
-
Vendido
-
Páginas
26
Grado
A+
Subido en
06-01-2026
Escrito en
2025/2026

This document covers the fundamental principles of cyber security, including common cyber threats, attack methods, and defense mechanisms. It explains key concepts such as network security, data protection, and risk management, making it suitable as an introductory overview or study summary for cyber security courses.

Mostrar más Leer menos
Institución
Cyber Security
Grado
Cyber security










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cyber security
Grado
Cyber security

Información del documento

Subido en
6 de enero de 2026
Número de páginas
26
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Vista previa del contenido

cyber security


Q.1 What is Cyber Space ?
Ans. The electronic medium of computer networks, in which online communication takes place.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum
to store, modify, and exchange data via networked systems and associated physical infrastructures.
In effect, cyberspace can be thought of as the interconnection of human beings through computers
and telecommunication, without regard to physical geography.

Q.2 What is Cyber Security ?
Ans Computer security, also known as cybersecurity or IT security, is security applied to
computers, computer networks, and the data stored and transmitted over them.
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines,
risk management approaches, actions, training, best practices, assurance and technologies that can
be used to protect the cyber environment and organization and user’s assets. Organization and
user’s assets include connected computing devices, personnel, infrastructure, applications,
services, telecommunications systems, and the totality of transmitted and/or stored information in
the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the
security properties of the organization and user’s assets against relevant security risks in the cyber
environment. The general security objectives comprise the following:
1. Availability
2. Integrity, which may include authenticity and non-repudiation
3. Confidentiality

Q 3. What is Cyber Crimes ?

Ans. “cyber crime” means any criminal or other offence that is facilitated by or involves the use
of electronic communications or information systems, including any device or the Internet or any
one or more of them
Cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on
other computers or posting confidential business information on the Internet.
Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the Internet
to steal personal information from other users. Two of the most common ways this is done is
through phishing and pharming. Both of these methods lure users to fake websites (that appear to
be legitimate), where they are asked to enter personal information. This includes login information,

,such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account
numbers, and other information criminals can use to "steal" another person's identity. For this
reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate
before entering your personal information.
Because cybercrime covers such a broad scope of criminal activity, the examples above are only
a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet
have made our lives easier in many ways, it is unfortunate that people also use these technologies
to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware
blocking software and being careful where you enter your personal information.




Q. 4 What is type of Cyber Crimes ?

Ans Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being accessed
from a remote location.

Theft: This crime occurs when a person violates copyrights and downloads music, movies, games
and software. There are even peer sharing websites which encourage software piracy and many of
these websites are now being targeted by the FBI. Today, the justice system is addressing this
cyber crime and there are laws that prevent people from illegal downloading.

Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of resorting
to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not
having the desired effect, they begin offline stalking along with cyber stalking to make the victims’
lives more miserable.

Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon

, moneyxorxtoxbuyxthingsxonlinexinxthexvictim’sxname.xItxcanxresultxinxmajorxfinancialxlossesxforxthexvi
ctimxandxevenxspoilxthexvictim’sxcreditxhistory.

MaliciousxSoftware:xThesexarexInternet-
basedxsoftwarexorxprogramsxthatxarexusedxtoxdisruptxaxnetwork.xThexsoftwarexisxusedxtoxgainxaccessxt
oxaxsystemxtoxstealxsensitivexinformationxorxdataxorxcausingxdamagextoxsoftwarexpresentxinxthexsyste
m.

Computer-
basedxfraud.xFraudxisxdifferentxfromxtheftxbecausexthexvictimxvoluntarilyxandxknowinglyxgivesxthex
moneyxorxpropertyxtoxthexcriminalxbutxwouldxnotxhavexifxthexcriminalxdidxnotxmisrepresentxthemselv
esxorxtheirxoffering.xFraudxisxaxlie.xIfxsomeonexleadsxyouxonxorxallowsxyouxtoxbelievexsomethingxthatx
isxfalsextoxbenefitxthem,xtheyxarexlyingxandxthisxisxfraud.xYouxbecomexaxvictimxwhenxyouxvoluntarily
x surrenderxmoniesxorxpropertyxbasedxonxtheirxmisrepresentationxorxlie.xLosingxmoneyxfromxcompute
rxcrimexcanxbexespeciallyxdevastatingxbecausexoftenxitxisxveryxdifficultxtoxgetxthexmoneyxback.xOther
x thanxdirectxscams,xfraudxcanxincludexactsxsuchxasxalteringxdataxtoxgetxaxbenefit;xexamplesxarexremov
ingxarrestxrecordsxfromxaxpolicexstationxserver,xchangingxgradesxonxaxschoolxcomputerxsystem,xorxde
letingxspeedingxticketsxfromxdrivingxrecords.
Onlinexgambling.xGamblingxoverxthexinternetxisxaxviolationxofxAmericanxlawxbecausexthexgamblin
gxservicexprovidersxrequirexelectronicxpaymentxforxgamblingxthroughxthexusexofxcreditxcards,xdebitxc
ards,xelectronicxfundxtransfersxwhichxisxillegalxunderxrecentxUSxlegislation.


Q.x5xwhatxisxHacking?
Ansx
 ThexProcessxofxattemptingxtoxgainxorxsuccessfullyxgaining,xunauthorizedxaccessxtoxcompute
rxresourcesxisxcalledxxxHacking.
 Stealingxofxdataxandxinformationxfromxsomeonexelse’sxcomputerxorx
xxxx Networkxwithoutxthexpriorxpermissionxofxthexowner.
 thexactxofxgainingxunauthorizedxaccessxtoxcomputerxsystemsxforxthex
xxx Purposexofxstealingxandxcorruptingxdata.x
 ComputerxHackingxisxthexpracticexofxmodifyingxcomputerxhardwarexand
xxxx Softwarextoxaccomplishxaxgoalxoutsidexofxthexcreator’sxoriginalxpurpose.x
 thexactxofxgainingxaccessxwithoutxlegalxauthorizationxtoxaxcomputerxorx
$11.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Proffscholar4

Conoce al vendedor

Seller avatar
Proffscholar4 stuvia
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
8 meses
Número de seguidores
0
Documentos
66
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes