Cyber Security Technical Questions Q &A
Compiled by Professor Kevin
, Cyber security refers to the protection of internet-
connected systems such as software, hardware,
Define Cyber security? electronic data, etc., from cyber-attacks. In a
computing text, it is referred to as protection
Against unauthorized access.
Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the
What is Cryptography?
information from third parties for whom data is not
Authorized.
Threat: Someone with the potential to cause harm
by damaging or destroying the official data of a
System or organization.
Ex: Phishing attack
Vulnerability: It refers to weaknesses in a system that
What is the difference
makes threat outcomes more possible and even
between Threat,
More dangerous.
Vulnerability and Risk?
Ex: SQL injections, cross-site scripting
Risk: It refers to a combination of threat probability
And impact/loss. In simple terms, it is related to
potential damage or loss when a threat exploits the
Vulnerability.
, Cross-Site Scripting is also known as a client-side
injection attack, which aims at executing malicious
scripts on a victim's web browser by injecting
Malicious code.
What is Cross-Site
The following practices can prevent Cross-Site
Scripting and how it can
Scripting:
Be prevented?
Encoding special characters
Using XSS HTML Filter
Validating user inputs
Using Anti-XSS services/tools
See IA Botnet is a group of internet-connected
devices such as servers, PCs, mobile devices, etc.,
That are affected and controlled by malware.
What is a Botnet? It is used for stealing data, sending spam,
performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the
User to access the device and its connection. Mage
CIA (confidentiality, integrity, and availability) triad is
a model designed to handle policies for information
Security within an organization.
Confidentiality - A collection of rules that limits
What is a CIA triad? Access to information.
Integrity - It assures the information is trustworthy
And reliable.
Availability - It provides reliable access to data for
Authorized people.
Both hashing and encryption are used to convert
Readable data into an unreadable format. The
What is the difference
significant difference is that encrypted data can be
between hashing and
transformed into original data by decryption,
Encryption?
whereas hashed data cannot be processed back to
The original data.
Compiled by Professor Kevin
, Cyber security refers to the protection of internet-
connected systems such as software, hardware,
Define Cyber security? electronic data, etc., from cyber-attacks. In a
computing text, it is referred to as protection
Against unauthorized access.
Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the
What is Cryptography?
information from third parties for whom data is not
Authorized.
Threat: Someone with the potential to cause harm
by damaging or destroying the official data of a
System or organization.
Ex: Phishing attack
Vulnerability: It refers to weaknesses in a system that
What is the difference
makes threat outcomes more possible and even
between Threat,
More dangerous.
Vulnerability and Risk?
Ex: SQL injections, cross-site scripting
Risk: It refers to a combination of threat probability
And impact/loss. In simple terms, it is related to
potential damage or loss when a threat exploits the
Vulnerability.
, Cross-Site Scripting is also known as a client-side
injection attack, which aims at executing malicious
scripts on a victim's web browser by injecting
Malicious code.
What is Cross-Site
The following practices can prevent Cross-Site
Scripting and how it can
Scripting:
Be prevented?
Encoding special characters
Using XSS HTML Filter
Validating user inputs
Using Anti-XSS services/tools
See IA Botnet is a group of internet-connected
devices such as servers, PCs, mobile devices, etc.,
That are affected and controlled by malware.
What is a Botnet? It is used for stealing data, sending spam,
performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the
User to access the device and its connection. Mage
CIA (confidentiality, integrity, and availability) triad is
a model designed to handle policies for information
Security within an organization.
Confidentiality - A collection of rules that limits
What is a CIA triad? Access to information.
Integrity - It assures the information is trustworthy
And reliable.
Availability - It provides reliable access to data for
Authorized people.
Both hashing and encryption are used to convert
Readable data into an unreadable format. The
What is the difference
significant difference is that encrypted data can be
between hashing and
transformed into original data by decryption,
Encryption?
whereas hashed data cannot be processed back to
The original data.