100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security and Incident Management part 1

Rating
-
Sold
1
Pages
35
Grade
A
Uploaded on
22-09-2021
Written in
2021/2022

Exam of 35 pages for the course Unit 11 - Cyber Security and Incident Management at PEARSON (Get it)

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
September 22, 2021
Number of pages
35
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Pearson Set Assignment
Activity -1
UNIT 11 CYBER SECURITY AND INCIDENT MANAGEMENT
ASSESSOR – HIMANSHU BABBAR



STUDENT NAME: Ibrahim Zitouni

PEARSON ID: 20000351

DATE: 1 JUNE 2021

TIME: 10:00 AM – 3:00 PM

,Contents
Different cyber security threats to which organizations are exposed to as well as system vulnerabilities
which could affect IT systems......................................................................................................................2
Understanding the Scenario....................................................................................................................2
Definition of cybersecurity.......................................................................................................................2
How Internal Threats occur.........................................................................................................................2
How external threats function.....................................................................................................................4
System vulnerabilities which could affect IT Systems..................................................................................6
How organizations could use physical hardware and software security measures to counteract security
threats.........................................................................................................................................................8
User authentication...................................................................................................................................11
Topic 2 - Impact of Cyber Security threats while taking legal requirements into account.........................13
The Impact of Threats................................................................................................................................13
Legal requirements................................................................................................................................13
Topic 3 - How different network types and infrastructure of Davies Enterprises can be secured.............15
Different network types.............................................................................................................................16
Component................................................................................................................................................18
Securing Network components and infrastructure....................................................................................18
Intranet, Extranet, Internet and Cloud...................................................................................................19
Modern Trends & Interpreting Schematics................................................................................................20
Network Components................................................................................................................................22
Connection Media.....................................................................................................................................23
management & Troubleshooting Tools.....................................................................................................24
Network Application Software:..................................................................................................................24
Network & Device Operating Systems.......................................................................................................25
Network Infrastructure..............................................................................................................................25
Network Services.......................................................................................................................................29
Topic 4 – Evaluating the effectiveness of the measures used to protect organization from cyber security
while taking legal requirements into account............................................................................................30
References.................................................................................................................................................32




1|Page

,Different cyber security threats to which organizations
are exposed to as well as system vulnerabilities which
could affect IT systems

Understanding the Scenario

I have been recently hired at “Techno security” specializes in providing security products and services.
The company produces multiple cyber security software programs such as firewalls, anti-virus
applications as well as many other types of protection. One of the clients called “Davies Enterprises Ltd”
has asked my employers to find the security implications of a e-commerce business which allows people
to buy products digitally. The director has asked me to make a report . The director of techno security
has asked me to create a report about the current threats of cybersecurity.

Definition of cybersecurity
The process of protecting computers, servers, mobile devices, communications systems, databases,
including information from security threats is known as cyber protection. It 's commonly recognized as
electronic data security or information systems protection.

How Internal Threats occur
An internal threat corresponds towards the possibility of someone within an organization exploiting a
device in order either trigger harm or install malware. Employees are supposed to consider trustworthy
people who are given expanded rights what could potentially become exploited therefore certain types
of attacks are especially concerning.

Employee sabotage




The employees of an organization like Davies Limited provide exposure towards a broad variety of
hardware components within an organization, having just confidence as a safeguard against it
destroying as well as taking it. Which implies whether organization equipment, such as storage devices
comprising a variety of valuable information, may get potentially seized; instead, the information on the
storage device could be relocated through an USB drive, which could therefore be exposed but instead
reproduced publicly. Staff members may also purposefully destroy the Davies Enterprises if we would



2|Page

, relate it to the scenario infrastructure and information, including by removing information or destroying
an USB stick.

Unauthorized access from staff members




If Davies Limited have employees which currently possess connections into the corporation 's network
might be eligible to gain exposure towards parts throughout certain systems that others should not,
including a worker mistakenly allows oneself signed into as well as a door that could been kept
unattended giving anyone exposure through a network Individuals could often gain escalated
authorization which enable them to conduct additional administration tasks including such modifying
certain clients' permissions and otherwise disabling vulnerability management software, which
individuals might acquire or vindictively gain. Similar problems could serve as a steppingstone towards
other assaults.

Weak cyber security measure and practices




Davies Limited lacks adequate virtual and analog protection, it enhances the risk towards a weakness
becoming compromised, particularly throughout light of recent problems such as robbery. For instance,
whenever their networking resources is placed inside an unprotected space, anyone can come in there
or even harm or capture resources. Moreover, an average staff member might inadvertently trigger
certain weak points through performing anything as basic as accidentally exposing confidential
information about Davies Limited – a malware should be inadvertently installed, affecting the whole
system.




3|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ibrahimzitouni1
Follow You need to be logged in order to follow users or courses
Sold
76
Member since
4 year
Number of followers
68
Documents
12
Last sold
1 year ago

3.6

20 reviews

5
8
4
5
3
1
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions