NETWORK INTRUSION QUESTIONS
& ANSWERS(RATED A+)
Aspects of Organizational Security - ANSWERIT Security;
Physical Security;
Financial Security;
Legal Security;
Application Security [IT Security] - ANSWERApplications should be secured to
overcome security weaknesses, vulnerabilities, and threats. Any loopholes in Web-
based and other custom applications serve as opportunities for attackers.
Computing Security [IT Security] - ANSWERComputers should be secured from
threats like viruses, Trojans, and intruders. organizations must have an effective
security policy which involves security management, systems engineering, protection
against insider threats, and general workplace policies, standards, guidelines, and
procedures.
IT Security - ANSWERConsists of:
Application security;
Computing security:
Data security:
Information security;
Network security;
Data Security [IT Security] - ANSWERimportant information about the organization. It
is important to secure data to avoid any manipulation of data, data loss, or threats to
data secrecy. Any change in the identity of data or any loss of data causes a huge
amount of damage, financial loss, and loss of goodwill for the organization.
Information Security [IT Security] - ANSWERSecuring information protects
information and information systems from illegal access, use, modification, or
destruction. It ensures confidentiality, integrity, and availability of data.
Network Security [IT Security] - ANSWERNetworks are used to send important and
private data from one system to another. Networks should be secured for safe
transfer of data. Damage to the network makes the data transfer vulnerable and may
crash the system.
Physical Security - ANSWERConsists of:
Facilities security:
Human security:
Border security;
Biometric security;
, Facilities Security [Physical Security] - ANSWERFacilities and an organization's
equipment should be properly and highly secured. Damage to facilities can cause
physical harm such as a system crash or power failure.
Human Security [Physical Security] - ANSWERThe employees of an organization
should be given security awareness training and be involved in the entire business
security process in order to gain their trust and acceptance of the security policy.
Ignoring human security concerns can cause employees to leave, leading to loss of
business.
Financial Security - ANSWERConsists of:
Security from frauds;
Phishing attacks;
Botnets;
Threats from cyber criminals;
Credit card fraud;
Security from fraud [Financial Security] - ANSWERTo function properly and negate
losses, an organization must be financially secure from both internal and external
threats. Security breaches may be caused by data manipulations, system
vulnerabilities and threats, or data theft.
Legal Security - ANSWERConsists of:
National security;
Public security;
Defamation;
Copyright information;
Sexual harassment;
National security [Legal Security] - ANSWERNational security is threatened if there
are any governmental problems, improper management, economic slowdown, or
other nationwide issues.
Public Security [Legal Security] - ANSWERPublic security is threatened if there are
any internal riots, strikes, or clashes among the people of the country.
Forensic Readiness - ANSWERinvolves an organization having specific incident
response procedures in place, with designated trained personnel assigned to handle
any investigation. It enables an organization to collect and preserve digital evidence
in a quick and efficient manner with minimal investigation costs
First Responder: - ANSWERIs responsible for protecting, integrating, and preserving
the evidence obtained from the crime scene. The first responder must investigate the
crime scene in a lawful matter so that any obtained evidence will be acceptable in a
court of law
Computer Forensics or Forensic Computing: - ANSWERComputer forensics is the
application of investigation and analysis techniques to gather and preserve evidence
from a particular computing device in a way that is suitable for presentation in a court
of law.