100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary SPOC 2 Cybersecurity Governance - Digital Justice 2020/2021

Rating
-
Sold
3
Pages
15
Uploaded on
15-03-2021
Written in
2020/2021

Summary of the SPOC2 videos, part of the MSc Cybersecurity Governance track at Leiden University. All parts of the document that appeared in the actual SPOC2 quiz are marked yellow. I scored a 10/10 using this summary (and 1 little Google search), so passing the SPOC with this summary should be easy. Good luck!

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
March 15, 2021
Number of pages
15
Written in
2020/2021
Type
Summary

Subjects

Content preview

Summary SPOC2
2020/2021 - Cybersecurity Governance
Yellow highlights = what appeared in the SPOC2 quiz.




1

, Module 1: Cybersecurity threat landscape
More dependent on digital infrastructure:
- Confidentiality
- Integrity
- Availability

We need digital networked systems to work properly. Security is important in this.

2 types of damage in information and information systems:
1. Accidents​ → e.g. computer system fails because of programming error
2. Intentional​ → e.g. hack. ⇒ focus of this module.

Attack is ​not performed by a computer, but by a person​ = the threat actor. Cause of the
threat. Has an objective.
- Many types of ​threat actors​ → distinguish between: ​insider, script kiddie,
hacktivist, state actor, criminal, terrorist​. Each has their own goals e.g. sabotage,
espionage, information theft. They have their own target group, organisational form,
motives etc.
- Collective of threat actors = threat actor landscape




Studying the characteristics of an attack may point you to a type of actor.
→ E.g. ​Ransomware​ → usually applied by criminals for economic reasons.
→ Advanced attacks can indicate a state actor is behind it.

Malware
- Malicious + software




2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
summaries4u Universiteit van Amsterdam
Follow You need to be logged in order to follow users or courses
Sold
391
Member since
8 year
Number of followers
260
Documents
8
Last sold
1 month ago

3.8

61 reviews

5
18
4
20
3
17
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions