Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber Security - 2.1 - Threats to cyber security

Rating
-
Sold
-
Pages
1
Grade
A+
Uploaded on
22-06-2022
Written in
2021/2022

Vulnerability Flaws or issues that result in the weakness in the security of a system. System attack E.g. DoS, botnet, social engineering. 00:06 01:38 Physical E.g. theft of portable equipment such as laptops, tablets and portable drives. Environmental E.g. floods, fire and earthquakes. Accidental Unintentional events e.g. spilling liquid on a computer, dropping an item responding to a hoax email, deleting data by mistake. Intentional Criminal activities intent on harming computer systems e.g. hacking, social engineering, DoS, botnet. Cyber enabled crime E.g. fraud, theft and bullying using IT Cyber dependent crime Crime that can only be carried out using computer networks e.g. spreading malware, hacking and DoS. Money laundering The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries. Data mining The use of sophisticated tools to identify trends and patterns in large data stores. State sponsored Countries spying on each other to obtains information such as military campaigns, nuclear facilities, government policies and to spread fake news.

Show more Read less
Institution
Course

Content preview

Cyber Security - 2.1 - Threats to cyber
security
Vulnerability - Answer Flaws or issues that result in the weakness in the security of a
system.

System attack - Answer E.g. DoS, botnet, social engineering.

Physical - Answer E.g. theft of portable equipment such as laptops, tablets and portable
drives.

Environmental - Answer E.g. floods, fire and earthquakes.

Accidental - Answer Unintentional events e.g. spilling liquid on a computer, dropping an
item responding to a hoax email, deleting data by mistake.

Intentional - Answer Criminal activities intent on harming computer systems e.g.
hacking, social engineering, DoS, botnet.

Cyber enabled crime - Answer E.g. fraud, theft and bullying using IT

Cyber dependent crime - Answer Crime that can only be carried out using computer
networks e.g. spreading malware, hacking and DoS.

Money laundering - Answer The process by which criminals hide the origins of their
crime by transferring money through different bank accounts and countries.

Data mining - Answer The use of sophisticated tools to identify trends and patterns in
large data stores.

State sponsored - Answer Countries spying on each other to obtains information such
as military campaigns, nuclear facilities, government policies and to spread fake news.

Written for

Course

Document information

Uploaded on
June 22, 2022
Number of pages
1
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
satamu Arizona Western College
Follow You need to be logged in order to follow users or courses
Sold
260
Member since
3 year
Number of followers
216
Documents
4593
Last sold
3 months ago
Nursing school is hard....I can help!!!

STUDY GUIDE,CASE STUDY,ASSIGNMENTS,TEST BANKS & EXAMS ALL VERIFIED BY EXPERTS TO GUARANTEE AN EXCELLENT SCORE!!! HI! I will be providing you all with quality study materials, to be specific nursing documents. my aim is to help each and every student. I sell my documents at a fair price to make it easier for students to purchase and attain best grades. GOOD LUCK!!

4.1

58 reviews

5
32
4
10
3
11
2
1
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions