Answers Fully Solved
What is cyber security? - answer The way in which an individual/organization manages
its hardware, software, information and data.
What is the CIA triad? - answer A cyber security methodology that manages cyber
security standing for confidentiality, integrity and availability.
What is a packet sniffer? - answer A device that monitors data across a network able to
see everything that passes.
What is a symmetric key? - answer When the encryption and decryption codes are the
same.
What is an asymmetric or public key? - answer Everyone has access to the encryption
key but only the recipient has access to the decryption key.
What are the two types of privilege escalation? - answer vertical- users exploit bugs in a
system to gain higher level privileges.
horizontal- when another user gains access to someone on the same levels account.
What are the 6 types of cyber incidents? - answerUnauthorised access to data
modification of data
destruction of data
information disclosure
inaccessible data
theft of data
Why should you protect your data? - answerMail can be intercepted
Identity can be stolen
May not be allowed insurance
Why should an organisation protect its data? - answerTo protect income and IPs
They have to protect staff data under the DPA.
What is a vulnerability? - answerA flaw or issue that results in weakness of a system.
Name 3 types of threat. - answerSystem attacks (ddos, botnets)
Physical
Environmental
, State 4 examples of organised cyber crime. - answerStealing identities.
Stealing IP.
Black mail.
emptying bank accounts.
Name all 8 types of attackers. - answerCyber criminal, hacktivist, cyber terrorist, insider,
vulnerability broker, script kiddie, scammer, phisher.
What is a script kiddie? - answerSome who uses software or scripts created by others
to attack devices. (often done for thrill)
Name threats to mobile devices. - answerCan be lost.
less likely to have antivirus.
Can connect to networks automatically in some cases.
Name the types of cyber security controls. - answerHardware, software, Encryption,
Physical, procedures.
Define phishing. - answerThe act of trying to obtain sensitive data by pretending to be a
trustworthy source.
What is an information broker? - answerSomeone who collects data on people to sell.
What are motivations for attackers? - answerThrill, Income generation, spying, righting
perceive wrongs, fraud, public good.
What is a cookie? - answerA piece of text sent from a web server stored on the user's
computer to track and store information.
What is money laundering? - answerHiding the origin of illegally obtained money.
Define state sponsored threats to cyber security. - answerAny cyber attacks done by
government spies on foreign powers.
What are the different types of targets for cyber criminals? - answerIndividuals,
Organisations, Equipment, information and data.
Why would equipment by targeted in a cyber attack? - answerThey may have weaker
virus and network protections than most. Can be lost. Can connect to networks
automatically in some cases.
What does the communications act 2003 do? - answerMakes it illegal to transmit
messages over a network that are offensive, indecent, obscene or menacing.