cyber security unit 11 questions with complete sol
Written for
PEARSON (PEARSON)
PEARSON
PEARSON
All documents for this subject (2019)
Seller
Follow
flyhigher329
Reviews received
Content preview
Cyber Security Unit 11 (Pearson)
Downloading Malicious content - correct answer When Malware is installed onto an
organisation's system, usually unintentionally
Social Engineering - correct answer Techniques that trick a person into disclosing
confidential information
What is an internal Security Threat? - correct answer An Internal Threat is a risk
posed by employees at a company who could steal or damage data, or access and
share data that they aren't supposed to access. This risk may not be intentional.
What are external Security Threats? - correct answer External threats are security
risks from people outside of your organisation, such as hackers and saboteurs. They
can be much harder to deal with than internal threats, as you cannot monitor people
from the outside like you can employees.
Malicious Software - correct answer Software designed to harm a computer, such as
Keyloggers, Adware, Ransomware, Trojans and Worms.
Hacking - correct answer The act of exploiting weaknesses in a computer system to
gain access and steal data.
Sabotage - correct answer When services are deliberately disrupted, through the use
of DDoS attacks, spreading Malware or even physically destroying computer
equipment.
General Data Protection Regulation - correct answer A regulation in EU law on data
protection and privacy in the European Union and the European Economic Area. It also
addresses the transfer of personal data outside the EU and EEA areas.
Computer Misuse Act - correct answer UK law governing criminal offences committed
using a computer; unauthorised access to computer material,
unauthorised access with intent to commit or facilitate commission of further offences,
unauthorised acts with intent to impair operation of computer
Telecommunications Act - correct answer Organisations can record communications
on private networks that occur as part of lawful business practice
Fraud Act - correct answer An act that makes Cyber Fraud (such as distributing hoax
emails) illegal.
Private key - correct answer A cryptographic key that is only held by the recipient, but
is needed to decrypt the data
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller flyhigher329. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.