100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security Final Exam | updated 2023/24 with complete solution

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
21-10-2023
Written in
2023/2024

Cyber Security Final Exam | updated 2023/24 with complete solution Vulnerability - a weakness that could be exploited to cause harm Threat - a set of circumstances that could cause harm. Asset - Things of value you want to protect. such as hardware, software, and data Control - an action, device, procedure, or technique that removes or reduces a vulnerability Countermeasure - a means to counter threats by preventing, deterring, deflecting, mitigating, detecting, or recovering. another word for control. CIA - confidentiality, integrity, availability. Interception - someone intercepts your data. sees it. breach of confidentiality Modification - someone or something modifies data. failure in integrity fabrication - someone or something fabricates data. Failure in integrity interruption - someone or something interrupts a flow of data or access to a computer. Failure of availability four acts of the nature of the harm caused to assets. (4 types of harm) - Interception, Modification, fabrication, interruption Targeted - directed attack: attacker intends harm to specific computers, perhaps at one organization (think of attacks against a political organization) or belonging to a specific individual (think of trying to drain a specific person's bank account, for example, by impersonation). Also against a certain product (regardless of whether random people are using the product) Random - attacker wants to harm any computer or user; such an attack is analogous to accosting the next pedestrian who walks down the street. An example of a random attack is malicious code posted on a website that could be visited by anybody. malicious - human caused. person actually wants to cause harm, and so we often use the term attack for a malicious computer security event. non-malicious - human caused. unintentional, harm. can be big or small APT (Advanced Persistent Threat) - come from organized, well financed, patient assailants. Often affiliated with governments. Long term campaigns. carefully select their targets, crafting attacks that appeal to specifically those targets. Silent hidden attacks, not opportunistic by nature Harm - The negative consequence of an actualized threat. The results of bad stuff. Risk Management - choosing which threats to control and what resources to devote to protection. weighing the seriousness of a threat against our ability to protect because resources are limited. Method - the how of the attack. the skills, knowledge, tools, and other things with which to perpetrate the attack. Opportunity - the when. is the time and access to execute an attack. Like a person using an unsecured wifi connection Motive, Method, Opportunity - All necessary for an attack to succeed. Motive - the why of an attack. the reason to want to attack Defense in Depth (overlapping controls) - more than one control or more than one class of control to achieve protection. Physical Controls - stop or block an attack by using something tangible too, such as walls and fences Procedural (administrative) controls - controls that use a command or agreement that requires or advises people how to act such as laws or guidelines Technical controls - counter threats with technology (hardware or software), including passwords, encryption, etc. Access control - limiting who can access what in what ways, a mechanical process least privilege - a subject should have access to the smallest number of objects necessary to perform some task. part of effective policy implementation granularity - the fineness or specificity of access control. whether you are controlling access to the bit or to the entire computer. specificity of access control. smaller the granularity the more decisions to be made limited privilege - the act of restraining users and processes so that any harm they can do is not catastrophic. recognizes that all users aren't ethical. a management concept, not a technical control. establishment of user's limits propagation of access - a user who has been passed rights to something passing rights to another user. a problem of access control and the revocation of access privilege list (directory) - a row of the access matrix, showing all those privileges or access rights for a given subject. used for ease of revoking one person's access to things. shows what one person has access to access control list - object based, shows who can do what in regards to one certain thing. procedure-orientated protection - a procedure that controls access to objects.In essence, the procedure forms a capsule around the object, permitting only certain specifi

Show more Read less
Institution
Cyber Security Specialist
Course
Cyber Security Specialist









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Specialist
Course
Cyber Security Specialist

Document information

Uploaded on
October 21, 2023
Number of pages
10
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUVEX NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
724
Member since
2 year
Number of followers
313
Documents
15137
Last sold
1 day ago
STUVATE - STUVIA USA

Our store is a comprehensive destination for buying and selling a variety of documents. we offer a vast range of documents that cater to different needs and requirements, our documents are well-researched, accurate, and of high quality, ensuring customer satisfaction. whether you are looking for legal documents, academic papers, business reports or miscellaneous documents we`ve got you covered.

3.8

110 reviews

5
42
4
29
3
23
2
7
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions