100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
Top 50 Cybersecurity Questions and Answers Rated A+ $16.49
In winkelwagen

Tentamen (uitwerkingen)

Top 50 Cybersecurity Questions and Answers Rated A+

 0 keer verkocht
  • Vak
  • Cyber Security
  • Instelling
  • Cyber Security

Top 50 Cybersecurity Questions and Answers Rated A+ Define Cybersecurity? Cybersecurity refers to the protection of internet-connected systems such as software, hardware, electronic data, etc., from cyber attacks. In a computing text, it is referred to as protection against unauthorized access. ...

[Meer zien]

Voorbeeld 2 van de 11  pagina's

  • 17 september 2024
  • 11
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • Cyber Security
  • Cyber Security
avatar-seller
julianah420
Top 50 Cybersecurity Questions and
Answers Rated A+


Define Cybersecurity? - Cybersecurity refers to the protection of internet-connected
systems such as software, hardware, electronic data, etc., from cyber attacks. In a
computing text, it is referred to as protection against unauthorized access.

What is Cryptography? - Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the information from third parties for
whom data is not authorized.

What is the difference between Threat, Vulnerability, and Risk? - Threat: Someone with
the potential to cause harm by damaging or destroying the official data to a system or
organization.
Ex: Phishing attack

Vulnerability: It refers to weaknesses in a system that makes threat outcomes more
possible and even more dangerous.
Ex: SQL injections, cross-site scripting

Risk: It refers to a combination of threat probability and impact/loss. In simple terms, it is
related to potential damage or loss when threat exploits the vulnerability

An asset is what we're trying to protect.
Threat - Anything that can exploit a vulnerability, intentionally or accidentally, and
obtain, damage, or destroy an asset.
A threat is what we're trying to protect against.
Vulnerability - Weaknesses or gaps in a security program that can be exploited by
threats to gain unauthorized access to an asset.
A vulnerability is a weakness or gap in our protection efforts.
Risk - The potential for loss, damage or destruction of an asset as a result of a threat
exploiting a vulnerability.
Risk is the intersection of assets, threats, and vulnerabilities.

What is Cross-Site Scripting and how it can be prevented? - Cross-Site Scripting is also
known as a client-side injection attack, which aims at executing malicious scripts on a
victim's web browser by injecting malicious code.
The following practices can prevent Cross-Site Scripting:
Encoding special characters
Using XSS HTML Filter

, Validating user inputs
Using Anti-XSS services/tools

What is the difference between IDS and IPS? - Intrusion Detection Systems (IDS)
It only detects intrusions but unable to prevent intrusions.
It's a monitoring system.
It needs a human or another system to look at the results.

Intrusion Prevention Systems (IPS)
It detects and prevents intrusions.
It's a control system.
It needs a regularly updated database with the latest threat data.

What is a Botnet? - A Botnet is a group of internet-connected devices such as servers,
PCs, mobile devices, etc., that are affected and controlled by malware.
It is used for stealing data, sending spam, performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the user to access the device and its
connection.

What is a CIA triad? - CIA (confidentiality, integrity, and availability) triad is a model
designed to handle policies for information security within an organization.

Confidentiality - A collection of rules that limits access to information.

Integrity - It assures the information is trustworthy and reliable.

Availability - It provides reliable access to data for authorized people.

What is the difference between hashing and encryption? - Both hashing and encryption
are used to convert readable data into an unreadable format. The significant difference
is that encrypted data can be transformed into original data by decryption, whereas
hashed data cannot be processed back to the original data.

What is two-factor authentication and how it can be implemented for public websites? -
Tw0-factor authentication is also referred to as dual-factor authentication or two-step
verification where the user provides two authentication factors for protecting both user
credentials and resources while accessing.

The two-factor authentication can be implemented on public websites such as Twitter,
Microsoft, LinkedIn, and more for enabling another protection on your already protected
account with a password.

For enabling this double factor authentication, you can easily go to settings and then
manage security settings.

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, creditcard of je Stuvia-tegoed en je bent klaar. Geen abonnement nodig.

Direct to-the-point

Direct to-the-point

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper julianah420. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor $16.49. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 64670 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Begin nu gratis
$16.49
  • (0)
In winkelwagen
Toegevoegd