100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Unit 11 - Cyber Security and Incident Management Notes (DISTINCTION ACHIEVED) (60 PAGES)

Rating
3.2
(5)
Sold
17
Pages
58
Uploaded on
30-01-2024
Written in
2023/2024

These are my notes that cover the all of the topics and will help you build good knowledge to be ready for Unit 11 - Cyber Security & Incident Management exam. I achieved a overall grade of distinction for the exam using my notes for revision. Around 15 different topics are covered through 60 pages in the document. Feel free to message if you have any questions.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
January 30, 2024
File latest updated on
April 24, 2024
Number of pages
58
Written in
2023/2024
Type
Summary

Subjects

Content preview

Unit 11 Notes

Internal Threats
An internal threat refers to the risk of somebody from the inside of a company who
could exploit a system in a way to cause damage or steal data.

Employee Sabotage and Theft

● Employees have the privilege of accessing a wide range of physical equipment
inside the company.
● Hardware like hard drives, which could contain a lot of important data, can be
physically stolen from the company or the data can be stolen by transferring it
onto an external hard drive or a USB stick.
● Employees could damage equipment or data by deleting the data, or smashing a
hard-drive.

Unauthorised access by employees

● As employees have access to these systems within a company, they may be able
to gain access through a colleague who leaves themselves logged in, or a room
left unlocked providing access to a server.
● They could also obtain administrative privileges that allow them to perform
administrative functions, such as changing rights of other users or deactivating
network security tools.

,Weak Cyber Security Measures and Unsafe Practices

● By not having appropriate digital and physical security, the company increases
the chance of a vulnerability being exploited.
● For example, if the servers’ for a company’s network are left in an unlocked room,
anybody can walk into it and damage/steal property. This can be an employee or
a visitor who hasn’t been properly security checked.
● Another example, security vulnerabilities may be accidentally exploited by an
ordinary employee, by viewing an untrustworthy website - a virus can be
unintentionally downloaded that can affect the whole network.

Physical Ways to protect your physical security network (Server):

● Security Cameras
● Lock rooms
● ID Doors or swipe card access (this means trusted visitors get an ID badge)
● Privacy Screens

Accidental Loss or Disclosure of Data

● Simple accidents can occur such as a person may carry their laptop to and from
work, they might forget it on the train back home one day - this means that
anybody can get a hold of the laptop and access it.
● Employee simply accidentally deleting data from a folder or spilling a drink on a
device.



External Threats
An external threat refers to the risk of somebody from the outside of a company who
attempts to exploit system vulnerabilities through the use of malicious software,
hacking, sabotage or social engineering.

These are much harder to deal with compared to internal threats as you cannot monitor
people from the outside.

Malicious Software

● Spyware gathers information on the user it has infected, secretly sending it away
to third-party sources - keyloggers can track what you type such as passwords.

, ● Viruses modify existing programs with malicious code and constantly replicate
itself throughout a computer, this causes the corruption of data and applications,
system failure and takes up storage or processing power.
● Worms are similar to viruses, however they can replicate themselves through a
network to spread to other computers, rather than through infecting files that are
spread. This allows them to perform similar functions to viruses but on a larger
scale.
● Rootkits are used to get unauthorised remote administrator access to a
computer or network. These are spread through by hiding in software that
appears to offer legitimate functionality.
● Trojans are malicious code that hides within a seemingly legitimate program.

Hacking

Hacking is a general term that describes the exploitation of vulnerabilities in a computer
system to gain unauthorised access to the system and its data.

There are a broad range of motivations which can be carried out by an individual,
company or government;

● Individual - profit to protest to recreation, actions for a political or social agenda
or simply to cause harm.
● Companies and Governments - will hire others to hack themselves (white
hackers) which is used to detect system vulnerabilities to prevent threat from
malicious (black hat) hackers.

Sabotage

Sabotage is a general term that describes an activity to deliberately disrupt services,
through the use of:

● Denial of service attacks
● Distributing malware
● Physically destroy computer equipment.

These can be carried out by individuals, terrorist organisations, companies or
government. Sabotage is specifically malicious, with the goal of causing damage.

Social Engineering

, Social engineering involves deceiving people into revealing private and confidential
information.

A common form of social engineering is phishing, which involves a user pretending to
be a trusted organisation, asking for another individual’s details.




Impact of Threats
No matter how much preparation goes into preventing an acting upon existing threats, it
is likely that some kind of damage will still be caused.

Impact level of the damage can be financial, operational, reputation or intellectual
property loss.

The types of Impact

Operational Loss

Operational loss refers to damages of the operating capability of an organisation. For
example, a business whose operations rely on IT systems can be prevented from
performing any work due to cybersecurity threats.

Financial Loss

● Financial Loss refers to damages to the wealth of an organisation, this includes
losses, compensation and legal fees.
● By financial loss, we mean actual increased costs, reduced income, caused by
the threat. This could be replacing damaged equipment or loss of sales due to
your website being down.
● Compensation fees and legal fees come as a result to compensate customers
that are affected by the threat and pay data protection fines placed on the
business.

Reputation Loss

● Reputation loss refers to the loss of trust and lower opinion of people to a
business as a result of them being affected by a threat.
● Customers no longer want to do business as they have concerns over whether
the service will be available (going down due to cybersecurity threats).
$17.84
Get access to the full document:
Purchased by 17 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 5 reviews
2 weeks ago

4 months ago

10 months ago

1 year ago

1 year ago

3.2

5 reviews

5
0
4
2
3
2
2
1
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Alex567 Gloucestershire College
Follow You need to be logged in order to follow users or courses
Sold
27
Member since
1 year
Number of followers
8
Documents
6
Last sold
1 month ago
Alex\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

3.8

8 reviews

5
2
4
3
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions