WGU - C702 Forensics and Network Intrusion Exam with
|| || || || || || || || ||
accurate detailed solutions || ||
Aspects of Organizational Security - ✔✔IT Security;
|| || || || || ||
Physical Security; ||
Financial Security; ||
Legal Security; ||
IT Security - ✔✔Consists of:
|| || || || ||
Application security; ||
Computing security: ||
Data security:
|| ||
Information security; ||
Network security; ||
Application Security [IT Security] - ✔✔Applications should be secured to overcome security
|| || || || || || || || || || || ||
weaknesses, vulnerabilities, and threats. Any loopholes in Web-based and other custom
|| || || || || || || || || || ||
applications serve as opportunities for attackers. || || || || ||
Computing Security [IT Security] - ✔✔Computers should be secured from threats like viruses,
|| || || || || || || || || || || || ||
Trojans, and intruders. organizations must have an effective security policy which involves
|| || || || || || || || || || || ||
security management, systems engineering, protection against insider threats, and general
|| || || || || || || || || ||
workplace policies, standards, guidelines, and procedures.
|| || || || ||
Data Security [IT Security] - ✔✔important information about the organization. It is important to
|| || || || || || || || || || || || || ||
secure data to avoid any manipulation of data, data loss, or threats to data secrecy. Any change in
|| || || || || || || || || || || || || || || || || ||
the identity of data or any loss of data causes a huge amount of damage, financial loss, and loss of
|| || || || || || || || || || || || || || || || || || || ||
goodwill for the organization. || || ||
,2
Information Security [IT Security] - ✔✔Securing information protects information and
|| || || || || || || || || ||
information systems from illegal access, use, modification, or destruction. It ensures
|| || || || || || || || || || ||
confidentiality, integrity, and availability of data. || || || || ||
Network Security [IT Security] - ✔✔Networks are used to send important and private data from
|| || || || || || || || || || || || || || ||
one system to another. Networks should be secured for safe transfer of data. Damage to the
|| || || || || || || || || || || || || || || ||
network makes the data transfer vulnerable and may crash the system.
|| || || || || || || || || ||
Physical Security - ✔✔Consists of: || || || || ||
Facilities security: ||
Human security: ||
Border security; ||
Biometric security; ||
Facilities Security [Physical Security] - ✔✔Facilities and an organization's equipment should be
|| || || || || || || || || || || ||
properly and highly secured. Damage to facilities can cause physical harm such as a system crash
|| || || || || || || || || || || || || || || ||
or power failure.
|| ||
Human Security [Physical Security] - ✔✔The employees of an organization should be given
|| || || || || || || || || || || || ||
security awareness training and be involved in the entire business security process in order to gain
|| || || || || || || || || || || || || || ||
their trust and acceptance of the security policy. Ignoring human security concerns can cause
|| || || || || || || || || || || || || || ||
employees to leave, leading to loss of business. || || || || || || ||
Financial Security - ✔✔Consists of: || || || ||
|| Security from frauds; || ||
|| Phishing attacks; ||
|| Botnets;
|| Threats from cyber criminals;
|| || ||
|| Credit card fraud;
|| ||
, 2
Security from fraud [Financial Security] - ✔✔To function properly and negate losses, an
|| || || || || || || || || || || || ||
organization must be financially secure from both internal and external threats. Security breaches
|| || || || || || || || || || || || ||
may be caused by data manipulations, system vulnerabilities and threats, or data theft.
|| || || || || || || || || || || ||
Legal Security - ✔✔Consists of:
|| || || ||
National security; ||
Public security; || ||
Defamation;
Copyright information; ||
Sexual harassment; ||
National security [Legal Security] - ✔✔National security is threatened if there are any
|| || || || || || || || || || || || ||
governmental problems, improper management, economic slowdown, or other nationwide issues. || || || || || || || || ||
Public Security [Legal Security] - ✔✔Public security is threatened if there are any internal riots,
|| || || || || || || || || || || || || || ||
strikes, or clashes among the people of the country.
|| || || || || || || ||
Forensic Readiness - ✔✔involves an organization having specific incident response procedures
|| || || || || || || || || || ||
in place, with designated trained personnel assigned to handle any investigation. It enables an
|| || || || || || || || || || || || || ||
organization to collect and preserve digital evidence in a quick and efficient manner with minimal
|| || || || || || || || || || || || || || ||
investigation costs ||
First Responder: - ✔✔Is responsible for protecting, integrating, and preserving the evidence
|| || || || || || || || || || || ||
obtained from the crime scene. The first responder must investigate the crime scene in a lawful
|| || || || || || || || || || || || || || || ||
matter so that any obtained evidence will be acceptable in a court of law
|| || || || || || || || || || || || ||
Computer Forensics or Forensic Computing: - ✔✔Computer forensics is the application of
|| || || || || || || || || || || ||
investigation and analysis techniques to gather and preserve evidence from a particular computing
|| || || || || || || || || || || ||
device in a way that is suitable for presentation in a court of law.
|| || || || || || || || || || || || || ||