Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber-Security Exam 1 Security

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
05-04-2024
Written in
2023/2024

Cyber-Security Exam 1 Security Problem The value of the information on technology is more valuable than the technology itself Attacker's Profile Generally inexperienced young people, script kiddies Electronic Crime When the computer is a target, or a computer is used to commit the crime Targets of Opportunity A hacker attacks a vulnerability, not necessarily the company itself Specifically Targeted Attacks Driven by a purpose, a hacktivist Structured Threats Planned, more funded, longer periods of activity Unstructured Threats Less funded, shorter periods of time, fewer people Difficulties in Defending Against Attacks Increased speed, sophistication, availability of attacks Security vs. Convenience The higher the security level the lower the convenience Confidentiality Security actions that ensure that only authorized parties can view the information and prevents the disclosure to others. Integrity Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered that data. Availability Security actions that ensures that data is accessible to authorized users. Layers of Information Security Confidentiality, integrity, availability Laws Protecting Electronic Data Privacy

Show more Read less
Institution
Course

Content preview

Cyber-Security Exam 1
Security Problem
The value of the information on technology is more valuable than the technology itself


Attacker's Profile
Generally inexperienced young people, script kiddies


Electronic Crime
When the computer is a target, or a computer is used to commit the crime


Targets of Opportunity
A hacker attacks a vulnerability, not necessarily the company itself


Specifically Targeted Attacks
Driven by a purpose, a hacktivist


Structured Threats
Planned, more funded, longer periods of activity


Unstructured Threats
Less funded, shorter periods of time, fewer people


Difficulties in Defending Against Attacks
Increased speed, sophistication, availability of attacks


Security vs. Convenience
The higher the security level the lower the convenience


Confidentiality
Security actions that ensure that only authorized parties can view the information and prevents the
disclosure to others.


Integrity
Security actions that ensure that the information is correct and no unauthorized person or malicious
software has altered that data.


Availability
Security actions that ensures that data is accessible to authorized users.


Layers of Information Security
Confidentiality, integrity, availability


Laws Protecting Electronic Data Privacy

, HIPPA, Sarbanes-Oxley Act of 2002, Gramm-Leach-Bliley Act, California Database Security Breach


Cyber-Terrorism
Attacks may be ideologically motivated


Targets of Cyber-Terrorism
Banking, military, energy, transportation, water


Cybercriminals
A generic term used to describe individuals who launch attacks against other users and their
computers; also describes a loose-knit network of attackers, identity thieves, and financial fraudsters.


Script Kiddies
Individuals who want to break into computers to create damage yet lack the advanced knowledge of
computers and networks needed to do so.


Comprehensive Security Strategy
Block attacks, update defenses, minimize losses, send secure information


Social Engineering
A means of gathering information for an attack by relying on the weaknesses of individuals.


Phishing
Sending an e-mail or displaying a web announcement that falsely claims to be from a legitimate
enterprise in an attempt to trick the user into surrendering private information.


Shoulder Surfing
Viewing information that is entered by another person.


Dumpser Diving
Digging through trash receptacles to find information that can be useful in an attack.


Key Logger
Hardware or software that captures and stores each keystroke that a user types on the computer's
keyboard.


Man-In-The-Middle


Offline Cracking


Dictionary Attack
A password attack that compares common dictionary words against those in a stolen password file.

Written for

Course

Document information

Uploaded on
April 5, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectDeniz Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4902
Last sold
6 months ago
Lect Deniz Academic Resources Hub

Lect Aziim is a highly experienced academic tutor and dedicated content creator with a strong track record of developing comprehensive, high-quality study materials for a wide range of university courses across the globe. With years of experience in higher education support, he excels at transforming complex academic concepts into clear, structured, and easy-to-follow resources that enhance student understanding and confidence. He provides an extensive collection of well-researched and carefully organized documents across key disciplines, including nursing, medicine, and various science fields. His materials cover essential topics such as anatomy, physiology, pharmacology, clinical practice, and core scientific principles, making them highly valuable for both coursework and intensive exam preparation. Each document is thoughtfully designed to align with university standards and curricula, ensuring accuracy, relevance, and practical application. Lect Aziim’s work stands out for its clarity, depth, and attention to detail, offering students concise summaries, detailed explanations, and exam-focused content that supports effective revision. His commitment to academic excellence and student success is reflected in the consistency and reliability of his materials, making him a trusted resource for learners seeking to improve performance and achieve their academic goals.

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions