100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber security Unit 3 Questions and Answers Already Passed

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
07-10-2023
Written in
2023/2024

Cyber security Unit 3 Questions and Answers Already Passed What is cyber security? The way in which an individual/organisation manages its hardware, software, information and data. What is the CIA triad? A cyber security methodology that manages cyber security standing for confidentiality, integrity and availability. What is a packet sniffer? A device that monitors data across a network able to see everything that passes. What is a symmetric key? When the encryption and decryption codes are the same. What is an asymmetric or public key? Everyone has access to the encryption key but only the recipient has access to the decryption key. What are the two types of privilege escalation? vertical- users exploit bugs in a system to gain higher level privileges. horizontal- when another user gains access to someone on the same levels account. What are the 6 types of cyber incidents? Unauthorised access to data modification of data destruction of data information disclosure inaccessible data theft of data Why should you protect your data? Mail can be intercepted Identity can be stolen May not be allowed insurance Why should an organisation protect its data? To protect income and IPs They have to protect staff data under the DPA. What is a vulnerability? A flaw or issue that results in weakness of a system. Name 3 types of threat. System attacks (ddos, botnets) Physical Environmental State 4 examples of organised cyber crime. Stealing identities. Stealing IP. Black mail. emptying bank accounts. Name all 8 types of attackers. Cyber criminal, hacktivist, cyber terrorist, insider, vulnerability broker, script kiddie, scammer, phisher. What is a script kiddie? Some who uses software or scripts created by others to attack devices. (often done for thrill) Name threats to mobile devices. Can be lost. less likely to have antivirus. Can connect to networks automatically in some cases. Name the types of cyber security controls. Hardware, software, Encryption, Physical, procedures. Define phishing. The act of trying to obtain sensitive data by pretending to be a trustworthy source. What is an information broker? Someone who collects data on people to sell. What are motivations for attackers? Thrill, Income generation, spying, righting perceive wrongs, fraud, public good. What is a cookie? A piece of text sent from a web server stored on the user's computer to track and store information. What is money laundering? Hiding the origin of illegally obtained money. Define state sponsored threats to cyber security. Any cyber attacks done by government spies on foreign powers. What are the different types of targets for cyber criminals? Individuals, Organisations, Equipment, information and data. Why would equipment by targeted in a cyber attack? They may have weaker virus and network protections than most. Can be lost. Can connect to networks automatically in some cases. What does the communications act 2003 do? Makes it illegal to transmit messages over a network that are offensive, indecent, obscene or menacing. Name the key aspects of risks management. Identify the risks, identify the probability of the risk occurring, monitoring and controlling the risk. What are the 4 types of risks in a computer system. Hardware, software, communication devices, information and data. Give an example of an environment vulnerability. A flood. Name 2 hardware assets. servers and computers. Name 3 communications equipment assets. Hubs, routers and modems. How are assets assessed for its vulnerability? The cost to the organisation and the effect of it occurring. Why are logs reviewed after a cyber security incident? To identify what, when and where the incident occurred to contain it. What is a backdoor/trapdoor? A method that allows people to access a network by bypassing the normal security due to a piece of code or shortcut. What can unauthorised cookies do? They can track the sites you visit and use information to enable others to send unwanted emails and popups. Name ways to protect against different vulnerabilities. Automated tools, patch deployment, manually. What are the stages of the vulnerabilities management life-cycle? Identify, prioritise assets, assess, Report, re-mediate and verify. What is patch deployment? When flaws or bugs are fixed through a software update. Where are IDS placed in a network? Between the firewall and the internet. Where are IPS placed in a network? Between a router and a switch. Why are procedures and policies created for security? So that incidents that do occur are more likely by accident. Why should you know the extent of an incident? So you know how to contain and manage it. Name ways to reduce the impact of an incident. Disabling user accounts. disconnecting from the internet. Resetting user passwords. What is whaling? Large scale phishing. What is Vishing? Voice phishing. What is a hacker? Someone who finds and exploits weaknesses in a computer system. What is information disclosure? The act of releasing all relevant information about a topic. Name 2 forms of unauthorised access. Hacking, escalation. Why should you test a system? It helps identify and mitigate risks. What are common policies for organisations? Acceptable use. Disaster recovery. Digital signature acceptance. Password password. Email. What is the purpose of a digital signature acceptance policy? To prove that documents are read and that signatures on documents are valid. What are benefits of IDS? They can qualify and quantify attacks. They can be set at certain packets. What is integrity? The accuracy and trustworthiness of data. What are examples of hardware controls? Locks, Safes. Name software controls. Anti-malware software. OS updates. Firewalls. What is a white hacker? An ethical hacker who often hacks to test a systems security strength. What is the purpose of illegally modifying data? To blackmail or harm organisations or individuals. How does a DOS attack occur? Sending too much traffic to a system or website where it cannot cope. What is social engineering? Obtaining peoples trust in order to gain confidential information. Give 2 example of an accidental threat. Accidentally deleting a file, accidentally dropping equipment. Why would insiders attack an organisation? If they feel the company has neglected them. If they are in debt. What is a SQL injection? A code injection that produces queries that should not available to normal users. What does SQL stand for? Structured query language. What are tips for having a BYOD policy? Keep a register of connected devices. Enforce security on all devices. Force VPN use. What do automated tools do? Identify and repair vulnerabilities without intervention from someone. What is a benefit of using automated tools? It repairs vulnerabilities without disrupting users. What is an example of a vulnerability scanner? OpenVAS Name types of access controls. Physical, encryption, firewall, Biometric. What does an email policy do? It describes how the email system can be used and what can be sent through the emails. What would be covered in an email policy? What type of emails can be sent not being allowed to send malware How spam and junk mail is dealt with. Whats the purpose of HIDS? It monitors all parts of the behaviour of a computer system detecting any issues. What is cyber enabled vs cyber dependent? Enabled- Committing crimes that do not require computers on them. Dependent- can only be done on computers. What is validation? The act of checking something is accurate. What is cross site scripting? A vulnerability in web applications which enables attackers to inject client-side scripts into web pages viewed by other users. What is ransom-ware? A type of malicious software (malware) designed to block access to a computer system until a sum of money is paid. What are RATs (remote access tools) A piece of software or programming that allows a remote "operator" to control a system as if they have physical access to that system. What is spyware? Software that enables a user to obtain confidential information about another's computer activities by transmitting data secretly from their hard drive.

Show more Read less
Institution
Cyber Security Unit 3
Course
Cyber security Unit 3









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber security Unit 3
Course
Cyber security Unit 3

Document information

Uploaded on
October 7, 2023
Number of pages
13
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1910
Member since
2 year
Number of followers
865
Documents
21200
Last sold
5 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

442 reviews

5
240
4
79
3
61
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions