Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

Engineering and Technology – Cyber Security, Higher Education Program, Comprehensive Study and Exam Preparation Material

Note
-
Vendu
-
Pages
26
Grade
A+
Publié le
14-01-2026
Écrit en
2025/2026

This document covers fundamental and applied concepts in Cyber Security within the Engineering and Technology discipline. It addresses key areas such as information security principles, network security, threat analysis, risk management, cryptography, security policies, and defensive technologies. The material is suitable for academic study, exam preparation, and foundational understanding of cybersecurity practices.

Montrer plus Lire moins
Établissement
J Cyber J Security J ?
Cours
J Cyber j Security j ?










Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
J Cyber j Security j ?
Cours
J Cyber j Security j ?

Infos sur le Document

Publié le
14 janvier 2026
Nombre de pages
26
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Aperçu du contenu

Q.1 jWhat jis jCyber jSpace j?
Ans. jThe jelectronic jmedium jof jcomputer jnetworks, jin jwhich jonline jcommunication jtakes jplace.
Cyberspace jis ja jdomain jcharacterized jby jthe juse jof jelectronics jand jthe jelectromagnetic jspectrum
j to jstore, jmodify, jand jexchange jdata jvia jnetworked jsystems jand jassociated jphysical jinfrastructures.
j In jeffect, jcyberspace jcan jbe jthought jof jas jthe jinterconnection jof jhuman jbeings jthrough jcomputers
j and jtelecommunication, jwithout jregard jto jphysical jgeography.

Q.2 jWhat jis jCyber jSecurity j?
Ans jComputer jsecurity, jalso jknown jas jcybersecurity jor jIT jsecurity, jis jsecurity japplied jto
jcomputers, jcomputer jnetworks, jand jthe jdata jstored jand jtransmitted jover jthem. j

Cybersecurity jis jthe jcollection jof jtools, jpolicies, jsecurity jconcepts, jsecurity jsafeguards, jguidelines,
jrisk jmanagement japproaches, jactions, jtraining, jbest jpractices, jassurance jand jtechnologies jthat jcan

jbe jused jto jprotect jthe jcyber jenvironment jand jorganization jand juser’s jassets. jOrganization jand

juser’s jassets jinclude jconnected jcomputing jdevices, jpersonnel, jinfrastructure, japplications,

jservices, jtelecommunications jsystems, jand jthe jtotality jof jtransmitted jand/or jstored jinformation jin

jthe jcyber jenvironment. jCybersecurity jstrives jto jensure jthe jattainment jand jmaintenance jof jthe

jsecurity jproperties jof jthe jorganization jand juser’s jassets jagainst jrelevant jsecurity jrisks jin jthe jcyber

jenvironment. jThe jgeneral jsecurity jobjectives jcomprise jthe jfollowing:

1. Availability
2. Integrity, jwhich jmay jinclude jauthenticity jand jnon-repudiation
3. Confidentiality

Q j3. jWhat jis jCyber jCrimes j?

Ans. j“cyber jcrime” jmeans jany jcriminal jor jother joffence jthat jis jfacilitated jby jor jinvolves jthe juse jof
jelectronic jcommunications jor jinformation jsystems, jincluding jany jdevice jor jthe jInternet jor jany

jone jor jmore jof jthem

Cybercrime jis jcriminal jactivity jdone jusing jcomputers jand jthe jInternet. jThis jincludes janything
j from jdownloading jillegal jmusic jfiles jto jstealing jmillions jof jdollars jfrom jonline jbank jaccounts.
j Cybercrime jalso jincludes jnon-monetary joffenses, jsuch jas jcreating jand jdistributing jviruses jon
j other jcomputers jor jposting jconfidential jbusiness jinformation jon jthe jInternet.
Perhaps jthe jmost jprominent jform jof jcybercrime jis jidentity jtheft, jin jwhich jcriminals juse jthe
j Internet jto jsteal jpersonal jinformation jfrom jother jusers. jTwo jof jthe jmost jcommon jways jthis jis jdone
j is jthrough jphishing jand jpharming. jBoth jof jthese jmethods jlure jusers jto jfake jwebsites j(that jappear
j to jbe jlegitimate), jwhere jthey jare jasked jto jenter jpersonal jinformation. jThis jincludes jlogin
j information, jsuch jas jusernames jand jpasswords, jphone jnumbers, jaddresses, jcredit jcard jnumbers,
j bank jaccount jnumbers, jand jother jinformation jcriminals jcan juse jto j"steal" janother jperson's

,j identity. jFor jthis jreason, jit jis jsmart jto jalways jcheck jthe jURL jor jWeb jaddress jof ja jsite jto jmake jsure
j it jis jlegitimate jbefore jentering jyour jpersonal jinformation.
Because jcybercrime jcovers jsuch ja jbroad jscope jof jcriminal jactivity, jthe jexamples jabove jare jonly ja
j few jof jthe jthousands jof jcrimes jthat jare jconsidered jcybercrimes. jWhile jcomputers jand jthe jInternet
j have jmade jour jlives jeasier jin jmany jways, jit jis junfortunate jthat jpeople jalso juse jthese jtechnologies
j to jtake jadvantage jof jothers. jTherefore, jit jis jsmart jto jprotect jyourself jby jusing jantivirus jand
j spyware jblocking jsoftware jand jbeing jcareful jwhere jyou jenter jyour jpersonal jinformation.




Q. j4 jWhat jis jtype jof jCyber jCrimes j?

Ans jHacking: jThis jis ja jtype jof jcrime jwherein ja jperson’s jcomputer jis jbroken jinto jso jthat jhis
jpersonal jor jsensitive jinformation jcan jbe jaccessed. jIn jthe jUnited jStates, jhacking jis jclassified jas ja


jfelony jand jpunishable jas jsuch. jThis jis jdifferent jfrom jethical jhacking, jwhich jmany jorganizations


juse jto jcheck jtheir jInternet jsecurity jprotection. jIn jhacking, jthe jcriminal juses ja jvariety jof jsoftware jto


jenter ja jperson’s jcomputer jand jthe jperson jmay jnot jbe jaware jthat jhis jcomputer jis jbeing jaccessed


jfrom ja jremote jlocation.




Theft: jThis jcrime joccurs jwhen ja jperson jviolates jcopyrights jand jdownloads jmusic, jmovies, jgames
jand jsoftware. jThere jare jeven jpeer jsharing jwebsites jwhich jencourage jsoftware jpiracy jand jmany jof


jthese jwebsites jare jnow jbeing jtargeted jby jthe jFBI. jToday, jthe jjustice jsystem jis jaddressing jthis


jcyber jcrime jand jthere jare jlaws jthat jprevent jpeople jfrom jillegal jdownloading.




Cyber jStalking: jThis jis ja jkind jof jonline jharassment jwherein jthe jvictim jis jsubjected jto ja jbarrage jof
jonline jmessages jand jemails. jTypically, jthese jstalkers jknow jtheir jvictims jand jinstead jof jresorting


jto joffline jstalking, jthey juse jthe jInternet jto jstalk. jHowever, jif jthey jnotice jthat jcyber jstalking jis jnot


jhaving jthe jdesired jeffect, jthey jbegin joffline jstalking jalong jwith jcyber jstalking jto jmake jthe jvictims’


jlives jmore jmiserable.




Identity jTheft: jThis jhas jbecome ja jmajor jproblem jwith jpeople jusing jthe jInternet jfor jcash
jtransactions jand jbanking jservices. jIn jthis jcyber jcrime, ja jcriminal jaccesses jdata jabout ja jperson’s


jbank jaccount, jcredit jcards, jSocial jSecurity, jdebit jcard jand jother jsensitive jinformation jto jsiphon


jmoney jor jto jbuy jthings jonline jin jthe jvictim’s jname. jIt jcan jresult jin jmajor jfinancial jlosses jfor jthe


jvictim jand jeven jspoil jthe jvictim’s jcredit jhistory.

, Malicious jSoftware: jThese jare jInternet-based jsoftware jor jprograms jthat jare jused jto jdisrupt ja
jnetwork. jThe jsoftware jis jused jto jgain jaccess jto ja jsystem jto jsteal jsensitive jinformation jor jdata jor


jcausing jdamage jto jsoftware jpresent jin jthe jsystem.




Computer-based jfraud. jFraud jis jdifferent jfrom jtheft jbecause jthe jvictim jvoluntarily jand
j knowingly jgives jthe jmoney jor jproperty jto jthe jcriminal jbut jwould jnot jhave jif jthe jcriminal jdid jnot
j misrepresent jthemselves jor jtheir joffering. jFraud jis ja jlie. jIf jsomeone jleads jyou jon jor jallows jyou jto
j believe jsomething jthat jis jfalse jto jbenefit jthem, jthey jare jlying jand jthis jis jfraud. jYou jbecome ja
j victim jwhen jyou jvoluntarily jsurrender jmonies jor jproperty jbased jon jtheir jmisrepresentation jor jlie.
j Losing jmoney jfrom jcomputer jcrime jcan jbe jespecially jdevastating jbecause joften jit jis jvery jdifficult
j to jget jthe jmoney jback. jOther jthan jdirect jscams, jfraud jcan jinclude jacts jsuch jas jaltering jdata jto jget ja
j benefit; jexamples jare jremoving jarrest jrecords jfrom ja jpolice jstation jserver, jchanging jgrades jon ja
j school jcomputer jsystem, jor jdeleting jspeeding jtickets jfrom jdriving jrecords.
Online jgambling. jGambling jover jthe jinternet jis ja jviolation jof jAmerican jlaw jbecause jthe jgambling
j service jproviders jrequire jelectronic jpayment jfor jgambling jthrough jthe juse jof jcredit jcards, jdebit
j cards, jelectronic jfund jtransfers jwhich jis jillegal junder jrecent jUS jlegislation.


Q. j5 jwhat jis jHacking?
Ans j
➢ The jProcess jof jattempting jto jgain jor jsuccessfully jgaining, junauthorized jaccess jto
jcomputer jresources jis jcalled j j jHacking.

➢ Stealing jof jdata jand jinformation jfrom jsomeone jelse’s jcomputer jor j
jjjj Network jwithout jthe jprior jpermission jof jthe jowner.
➢ the jact jof jgaining junauthorized jaccess jto jcomputer jsystems jfor jthe j
jjj Purpose jof jstealing jand jcorrupting jdata. j
➢ Computer jHacking jis jthe jpractice jof jmodifying jcomputer jhardware jand
jjjj Software jto jaccomplish ja jgoal joutside jof jthe jcreator’s joriginal jpurpose. j
➢ the jact jof jgaining jaccess jwithout jlegal jauthorization jto ja jcomputer jor j
jjj Computer jnetwork. j




j
$18.49
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
NERSEJUDY9

Faites connaissance avec le vendeur

Seller avatar
NERSEJUDY9 stuvia
Voir profil
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
Nouveau sur Stuvia
Membre depuis
2 mois
Nombre de followers
0
Documents
29
Dernière vente
-

0.0

0 revues

5
0
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions