100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Access Control Attacks

Rating
-
Sold
-
Pages
4
Uploaded on
16-10-2024
Written in
2022/2023

The Advanced Cybersecurity and Risk Management notes are from the University of Phoenix Advance Cybersecurity Certification course - these notes will assist you in understand different aspects and domains of Information Security. The notes will guide you through the process of understanding each domain to prepare you for future certification exams.

Show more Read less
Institution
Cyber Security Specialist
Course
Cyber Security Specialist








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Specialist
Course
Cyber Security Specialist

Document information

Uploaded on
October 16, 2024
Number of pages
4
Written in
2022/2023
Type
Summary

Content preview

Information Security – Cybersecurity Notes
UoPX Advanced Cybersecurity Certification
Access Control Attacks
Risk Elements
 Risk is the possibility or likelihood that a threat will exploit a vulnerability resulting in a
loss
 Threat is the potential occurrence that can result in an undesirable outcome
 Vulnerability is any type of weakness
Risk Management attempts to reduce or eliminate vulnerabilities or reduce the impact of
potential threats by implementing controls or countermeasures
 Identify Assets
o Asset valuation refers to identifying the actual value of assets with the goal of
prioritizing them
 Identify Threats
o Threat modeling refers to the process of identifying, understanding, and
categorizing potential threats with the goal is to identify a potential list of threats
to these systems and analyze the threats
o Advanced Persistent Threats is as group of attackers who are working together
and are highly motivated, skilled, and patient - they go after specific targets
o Threat modeling approaches

 Focused on Assets - uses asset valuation results and attempts to identify
threats to valuable assets
 Focused on Attackers - identify potential attackers and identify the threats
they represent based on the attacker's goals
 Focused on Software - if an org develops software, it can consider
potential threats against the software
 Identify Vulnerabilities
o Vulnerability analysis attempts to discover weaknesses in systems against
potential threats
 In context of access control, vulnerability analysis attempts to identify the
strengths and weaknesses of the different access control mechanisms and
the potential of a threat to exploit a weakness



1
$5.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
jimb6056

Also available in package deal

Thumbnail
Package deal
Cybersecurity and Risk Management
-
30 2024
$ 179.70 More info

Get to know the seller

Seller avatar
jimb6056 (self)
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
37
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions