100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 11: Cyber Security and Incident Management (Activity 1 - Threats and Vulnerabilities) £10.99   Add to cart

Exam (elaborations)

Unit 11: Cyber Security and Incident Management (Activity 1 - Threats and Vulnerabilities)

1 review
 1367 views  13 purchases

This document consists of 23 Threats and Vulnerabilities that you can use in almost every scenario. These covers all content of Learning Aim A of Unit 11 spec. I wrote down 19 of these in my exam and got full marks. You'll have to change the 'Probability', 'Potential size of loss / impact level' an...

[Show more]

Preview 2 out of 12  pages

  • December 28, 2022
  • 12
  • 2020/2021
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (45)

1  review

review-writer-avatar

By: colemanjoshua499 • 1 week ago

avatar-seller
Saim
Threat 1
number.
Risk severity. Extreme
Threat title. Network is vulnerable to virus attacks because the anti malware
software isn’t up to date and configured.
Probability. Very likely because guests and staff are surfing the internet and
receiving emails, meaning the network will pick up a virus at
some point.
Potential size Major because once the virus in installed on the network then it
of loss / could slow down the network by taking all of the storage space or
impact level. lock all the PCs depending on the type of virus.
Explanation As there is mention of anti malware / anti virus software in the
of the threat scenario, we can assume that is none in place currently. Due to
in context. the fact that users are surfing the internet and receiving emails
from clients and guests, it is likely that the system will pick up a
virus at some point if not already, because some of the emails
might be phishing attempts or users accidentally visiting an
untrusted website which downloaded malware onto the network.
Moreover, a malware might be currently in the network but
because there is no anti malware software currently installed, the
company might be unaware of that. This means all of company’s
data is under risk of being stolen.
Threat 2
number.
Risk severity. High
Threat title. Only one server available, No backups
Probability. Likely because the server will fail at some point as its
mechanical.
Potential size Major because if the server goes down, the company won’t be
of loss / able to save anything in server and any changing in the data will
impact level. be lost.
Explanation of The server stores confidential information about the company,
the threat in employees and customers. If it fails, then that means employees
context. and company will not be able to access the information that is
stored on the server and any changing in data will be lost. If the
data gets deleted either intentionally or accidentally, the company
will not be able to restore the data as there is no backup server
available. The lost data might have the company trade secrets
and other confidential information that is very vital for the
company. If data gets lost, this could lead the business to suffer
reputational and income loss as well as getting sued for not being
able to protect the customer information according to GDPR




Threat 3
number.

, Risk severity. Extreme
Threat title. Data stored on server is readable to everyone
Probability. Very Likely because if the server is hacked then the hacker can
read the data easily as its not stored in an encrypted format
Potential size Major because server has confidential information about
of loss / customers and company’s trade secrets, if these gets stolen then
impact level. the business will have to suffer several consequences
Explanation of Server stores confidential information about customer and trade
the threat in secrets of company. If this data gets stolen, then hacker can read
context. it easily due to the fact that it’s not stored in an encrypted
format. As there is no mention of encrypting the confidential data
stored on server, we can assume that its not. After stealing the
data, hacker can then use stolen data for fraudulent purposes for
financial gain or reveal the information online to damage
company’s reputation.
And because company don’t have any proper backups this means
any stolen data won’t be able to recover and any changes made
in the data will be lost. (only applies depending on scenario)



Threat 4
number.
Risk severity. High
Threat title. Files and Folders are not stored in Encrypted format
Probability. Likely because someone can get access to user’s PC using a
virus/infected links or a grudged employee may get access to
some other employee’s PC if its left unattended/unlocked
Potential size Major because if the hacker or intruder get access to a high
of loss / privileged employee’s PC then he can access all the files on the
impact level. PC as they aren’t encrypted.
Explanation of Just like the data stored on server isn’t encrypted, the files and
the threat in folders in employees and admin’s computer is not stated to be
context. encrypted either. This means if the hacker somehow gets access
to the admin or employee’s PC which can be done via infected
links that installs keylogger onto the PC when clicked or a
grudged employee getting access to another high privileged
employee’s PC, after getting access to the PC the hacker can
easily read, copy, modify or delete the files and folders on that
device as its not encrypted. Otherwise it will be hard for him to
get access to the information as it would require a decryption key
which is hard to generate.


Threat 5
number.
Risk severity. High
Threat title. Wi-Fi connection is not encrypted; Outdated Protocols Used
Probability. Likely because the data transferring through Wi-Fi would be
unencrypted and can be intercept very easily since its readable to

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Saim. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

66579 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£10.99  13x  sold
  • (1)
  Add to cart