Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber security - 3.2 - Testing and monitoring measures

Beoordeling
-
Verkocht
-
Pagina's
1
Cijfer
A+
Geüpload op
22-06-2022
Geschreven in
2021/2022

Vulnerability testing Identification of a list of vulnerabilities that can be prioritised in order of severity. Penetration testing A software tool that tests a computer system/network to identify vulnerabilities that could be exploited by an attacker. 00:06 01:38 Fuzzing Used to identify coding errors and security loopholes in software, operating systems and networks. It involves inputting huge amounts of random data in attempt to make the system crash. Security functionality Used to identify flaws in security mechanisms that are supposed to protect data and information and protect functionality. Sandboxing Test environment that isolates untested code changes to ensure that any issues are not transmitted to other areas of the system. Intrusion detection system Software that monitors computer system/network for unexpected/malicious activities Network intrusion detection system Monitors all inbound and outbound network activity to identify any suspicious patterns that indicate a cyber attack Host intrusion detection system Detects unusual , unauthorised or illegal activities on a specific device. Distributed intrusion detection system Consists of multiple IDSs over a large network that communicate with each other or a central server. Anomaly based Monitors network and system activity and classifies whether the activity is expected or not. Signature based Monitors specific patterns for network traffic or known instructions used by malware - must be kept up to date and requires regular signature updates Honeypot A computer system set up as a decoy to detect, deflect and even counteract any unauthorised used of the system. Intrusion prevention system proactive detection and prevention against unwanted intruders e.g.a firewall.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Cyber security - 3.2 - Testing and
monitoring measures
Vulnerability testing - Answer Identification of a list of vulnerabilities that can be
prioritised in order of severity.

Penetration testing - Answer A software tool that tests a computer system/network to
identify vulnerabilities that could be exploited by an attacker.

Fuzzing - Answer Used to identify coding errors and security loopholes in software,
operating systems and networks. It involves inputting huge amounts of random data in
attempt to make the system crash.

Security functionality - Answer Used to identify flaws in security mechanisms that are
supposed to protect data and information and protect functionality.

Sandboxing - Answer Test environment that isolates untested code changes to ensure
that any issues are not transmitted to other areas of the system.

Intrusion detection system - Answer Software that monitors computer system/network
for unexpected/malicious activities

Network intrusion detection system - Answer Monitors all inbound and outbound
network activity to identify any suspicious patterns that indicate a cyber attack

Host intrusion detection system - Answer Detects unusual , unauthorised or illegal
activities on a specific device.

Distributed intrusion detection system - Answer Consists of multiple IDSs over a large
network that communicate with each other or a central server.

Anomaly based - Answer Monitors network and system activity and classifies whether
the activity is expected or not.

Signature based - Answer Monitors specific patterns for network traffic or known
instructions used by malware - must be kept up to date and requires regular signature
updates

Honeypot - Answer A computer system set up as a decoy to detect, deflect and even
counteract any unauthorised used of the system.

Intrusion prevention system - Answer proactive detection and prevention against
unwanted intruders e.g.a firewall.

Geschreven voor

Vak

Documentinformatie

Geüpload op
22 juni 2022
Aantal pagina's
1
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
satamu Arizona Western College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
260
Lid sinds
3 jaar
Aantal volgers
216
Documenten
4590
Laatst verkocht
3 maanden geleden
Nursing school is hard....I can help!!!

STUDY GUIDE,CASE STUDY,ASSIGNMENTS,TEST BANKS & EXAMS ALL VERIFIED BY EXPERTS TO GUARANTEE AN EXCELLENT SCORE!!! HI! I will be providing you all with quality study materials, to be specific nursing documents. my aim is to help each and every student. I sell my documents at a fair price to make it easier for students to purchase and attain best grades. GOOD LUCK!!

4.1

58 beoordelingen

5
32
4
10
3
11
2
1
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen