Cyber-Security Exam 1 Security Problem |Compete with A+ Graded Answers
Cyber-Security Exam 1 Security Problem The value of the information on technology is more valuable than the technology itself Attacker's Profile Generally inexperienced young people, script kiddies Electronic Crime When the computer is a target, or a computer is used to commit the crime Targets of Opportunity A hacker attacks a vulnerability, not necessarily the company itself Specifically Targeted Attacks Driven by a purpose, a hacktivist Structured Threats Planned, more funded, longer periods of activity Unstructured Threats Less funded, shorter periods of time, fewer people Difficulties in Defending Against Attacks Increased speed, sophistication, availability of attacks Security vs. Convenience The higher the security level the lower the convenience Confidentiality Security actions that ensure that only authorized parties can view the information and prevents the disclosure to others. Integrity Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered that data. Availability Security actions that ensures that data is accessible to authorized users. Layers of Information Security Confidentiality, integrity, availability Laws Protecting Electronic Data Privacy
Written for
- Institution
- Cybersecurity
- Course
- Cybersecurity
Document information
- Uploaded on
- April 17, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber security exam 1 security problem the value o
Also available in package deal