Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cambridge Technical Unit 3 Cyber Security(completed)

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
22-06-2022
Written in
2021/2022

Cyber dependent illegal activities dependent on the use of computers and the internet, such as hacking or the distribution of malware on a network Access Management Managing the access to a computer system/network. It includes the procedures such as account administration, account maintenance account monitoring and the revoking of an account. 00:03 01:38 Account lockout A method performed by an OS that locks the user account when a user fails a login attempt more than a set number of times user Alarm systems and sensors Works in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. Consist of sensors including motion sensors, contact sensors and glass break detectors Anomaly based software Software that is designed to detect computer intrusions and misuse by monitoring system activity and clarifying it as either normal or anomalous (abnormal behavior) Anti-malware software Software designed to prevent, detect, and remove malicious software, such as a virus or a worm Application Security Use of software, hardware and procedural methods to protect applications from external threats Asset Something that is of value to a person, organisation or state Attacker Individuals or organisations that target computer systems/networks illegally. Audit trail A record of activities on a computer system/network E.g a record of modification to data or access to parts of a system/network Availability Level of assurance that the data will be available to those who need it when they want it. Bio-metric access Access to a computer system or network using technologies that measure and analyse human body characteristics for authentication purposes, such as DNA, fingerprints, retinas, voice patterns

Show more Read less
Institution
Course

Content preview

Cambridge Technical Unit 3 Cyber
Security
Cyber dependent - Answer illegal activities dependent on the use of computers and the
internet, such as hacking or the distribution of malware on a network

Access Management - Answer Managing the access to a computer system/network. It
includes the procedures such as account administration, account maintenance account
monitoring and the revoking of an account.

Account lockout - Answer A method performed by an OS that locks the user account
when a user fails a login attempt more than a set number of times user

Alarm systems and sensors - Answer Works in tandem with physical barriers,
mechanical systems, and security guards, serving to trigger a response when these
other forms of security have been breached. Consist of sensors including motion
sensors, contact sensors and glass break detectors

Anomaly based software - Answer Software that is designed to detect computer
intrusions and misuse by monitoring system activity and clarifying it as either normal or
anomalous (abnormal behavior)

Anti-malware software - Answer Software designed to prevent, detect, and remove
malicious software, such as a virus or a worm

Application Security - Answer Use of software, hardware and procedural methods to
protect applications from external threats

Asset - Answer Something that is of value to a person, organisation or state

Attacker - Answer Individuals or organisations that target computer systems/networks
illegally.

Audit trail - Answer A record of activities on a computer system/network E.g a record of
modification to data or access to parts of a system/network

Availability - Answer Level of assurance that the data will be available to those who
need it when they want it.

Bio-metric access - Answer Access to a computer system or network using technologies
that measure and analyse human body characteristics for authentication purposes, such
as DNA, fingerprints, retinas, voice patterns

Black hat hacker - Answer An individual with extensive computer knowledge whose
purpose is to breach or bypass internet security. These individuals are also known as
crackers or dark-side hackers.

Written for

Course

Document information

Uploaded on
June 22, 2022
Number of pages
3
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
satamu Arizona Western College
Follow You need to be logged in order to follow users or courses
Sold
260
Member since
3 year
Number of followers
216
Documents
4593
Last sold
2 months ago
Nursing school is hard....I can help!!!

STUDY GUIDE,CASE STUDY,ASSIGNMENTS,TEST BANKS & EXAMS ALL VERIFIED BY EXPERTS TO GUARANTEE AN EXCELLENT SCORE!!! HI! I will be providing you all with quality study materials, to be specific nursing documents. my aim is to help each and every student. I sell my documents at a fair price to make it easier for students to purchase and attain best grades. GOOD LUCK!!

4.1

58 reviews

5
32
4
10
3
11
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions