100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber security Questions and Answers $12.99   Add to cart

Exam (elaborations)

Cyber security Questions and Answers

 6 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Cyber security Questions and Answers Access management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring and the revocation of an account. Account lockout A software security method performed b...

[Show more]

Preview 2 out of 5  pages

  • September 17, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • audit trail
  • Cyber Security
  • Cyber Security
avatar-seller
julianah420
Cyber security Questions and Answers

Access management - answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account
monitoring and the revocation of an account.

Account lockout - answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set
number of times. For example, system software can be set up to lock an account for
several hours if the user fails the login three consecutive times in a set time frame.

Anti-malware - answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm

Anomaly based - answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.

Asset - answer Something that is of value to a person, an organization or a state, e.g.
data, finance and secrets that should be secured against cyber security incidents.

Attacker - answer Individuals or organizations that target computer systems/networks
illegally.

Audit trail - answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.

Availability - answer Data/information stored on a computer system/network must be
available to authorized users and organizations and be protected from unauthorized
deletion.

Biometric access - answer Access to a computer system/network using technologies
that measure and analyses human body characteristics for authentication purposes,
such as DNA, fingerprints, retinas, voice patterns, facial patterns and hand
measurements.

Botnet - answer A network of computers infected with malicious software and controlled
without the owners' knowledge, for example, to send spam or hoax emails.

Business continuity plan - answer A plan to continue operations that an organization will
follow if it is affected by a cyber security incident

, Confidentiality - answer Information stored on a computer system/network must be
protected against unintended or unauthorized access. Data confidentiality is a measure
of the ability of a system to protect its data.

Cybercriminal - answer An individual who commits illegal activities using computers and
the Internet.

Cyber dependent - answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.

Cyber enabled - answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as
fraudulently obtaining money for goods online.

Cyber security - answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorized
access and aims to protect data confidentiality, integrity and availability.

Cyber security incident - answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.

Cyber security incident report - answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed,
etc.

Denial of service - answer An attempt to disrupt a network/business/organization by
issuing more requests than a system is able to cope with, it can be performed with
malicious intent or as a protest.

Disaster recovery plan - answer A plan that documents a set of procedures for an
organization to follow in order to recover and protect a computer system and its data in
the event of a cyber security incident.

Encryption - answer A method that is used to attempt to ensure data security by use of
encrypted (secret) code. In order to read the contents of an encrypted message or file,
someone must have access to a secret key or password that will enable them to decrypt
the message or file.

Escalation of privileges - answer Exploiting a weakness or weaknesses in an operating
system or software application, such as a bug, design flaw or configuration oversight
and gaining elevated access to resources that are normally protected.

Ethical hacking - answerAn individual who attempts to penetrate a computer
system/network on behalf of its owners for the purpose of finding security vulnerabilities
that a malicious hacker could potentially exploit. He or she is also known as a white hat
hacker. He or she can also work alone.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart