Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber-Security Exam 1 Security

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
05-04-2024
Geschreven in
2023/2024

Cyber-Security Exam 1 Security Problem The value of the information on technology is more valuable than the technology itself Attacker's Profile Generally inexperienced young people, script kiddies Electronic Crime When the computer is a target, or a computer is used to commit the crime Targets of Opportunity A hacker attacks a vulnerability, not necessarily the company itself Specifically Targeted Attacks Driven by a purpose, a hacktivist Structured Threats Planned, more funded, longer periods of activity Unstructured Threats Less funded, shorter periods of time, fewer people Difficulties in Defending Against Attacks Increased speed, sophistication, availability of attacks Security vs. Convenience The higher the security level the lower the convenience Confidentiality Security actions that ensure that only authorized parties can view the information and prevents the disclosure to others. Integrity Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered that data. Availability Security actions that ensures that data is accessible to authorized users. Layers of Information Security Confidentiality, integrity, availability Laws Protecting Electronic Data Privacy

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Cyber-Security Exam 1
Security Problem
The value of the information on technology is more valuable than the technology itself


Attacker's Profile
Generally inexperienced young people, script kiddies


Electronic Crime
When the computer is a target, or a computer is used to commit the crime


Targets of Opportunity
A hacker attacks a vulnerability, not necessarily the company itself


Specifically Targeted Attacks
Driven by a purpose, a hacktivist


Structured Threats
Planned, more funded, longer periods of activity


Unstructured Threats
Less funded, shorter periods of time, fewer people


Difficulties in Defending Against Attacks
Increased speed, sophistication, availability of attacks


Security vs. Convenience
The higher the security level the lower the convenience


Confidentiality
Security actions that ensure that only authorized parties can view the information and prevents the
disclosure to others.


Integrity
Security actions that ensure that the information is correct and no unauthorized person or malicious
software has altered that data.


Availability
Security actions that ensures that data is accessible to authorized users.


Layers of Information Security
Confidentiality, integrity, availability


Laws Protecting Electronic Data Privacy

, HIPPA, Sarbanes-Oxley Act of 2002, Gramm-Leach-Bliley Act, California Database Security Breach


Cyber-Terrorism
Attacks may be ideologically motivated


Targets of Cyber-Terrorism
Banking, military, energy, transportation, water


Cybercriminals
A generic term used to describe individuals who launch attacks against other users and their
computers; also describes a loose-knit network of attackers, identity thieves, and financial fraudsters.


Script Kiddies
Individuals who want to break into computers to create damage yet lack the advanced knowledge of
computers and networks needed to do so.


Comprehensive Security Strategy
Block attacks, update defenses, minimize losses, send secure information


Social Engineering
A means of gathering information for an attack by relying on the weaknesses of individuals.


Phishing
Sending an e-mail or displaying a web announcement that falsely claims to be from a legitimate
enterprise in an attempt to trick the user into surrendering private information.


Shoulder Surfing
Viewing information that is entered by another person.


Dumpser Diving
Digging through trash receptacles to find information that can be useful in an attack.


Key Logger
Hardware or software that captures and stores each keystroke that a user types on the computer's
keyboard.


Man-In-The-Middle


Offline Cracking


Dictionary Attack
A password attack that compares common dictionary words against those in a stolen password file.

Geschreven voor

Vak

Documentinformatie

Geüpload op
5 april 2024
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€9,65
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectDeniz Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4902
Laatst verkocht
6 maanden geleden
Lect Deniz Academic Resources Hub

Lect Aziim is a highly experienced academic tutor and dedicated content creator with a strong track record of developing comprehensive, high-quality study materials for a wide range of university courses across the globe. With years of experience in higher education support, he excels at transforming complex academic concepts into clear, structured, and easy-to-follow resources that enhance student understanding and confidence. He provides an extensive collection of well-researched and carefully organized documents across key disciplines, including nursing, medicine, and various science fields. His materials cover essential topics such as anatomy, physiology, pharmacology, clinical practice, and core scientific principles, making them highly valuable for both coursework and intensive exam preparation. Each document is thoughtfully designed to align with university standards and curricula, ensuring accuracy, relevance, and practical application. Lect Aziim’s work stands out for its clarity, depth, and attention to detail, offering students concise summaries, detailed explanations, and exam-focused content that supports effective revision. His commitment to academic excellence and student success is reflected in the consistency and reliability of his materials, making him a trusted resource for learners seeking to improve performance and achieve their academic goals.

Lees meer Lees minder
5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen