Cyber Security Questions with Complete Solutions
Cyber Security Correct Answer-How organisations and individuals protect their information assets, data software and hardware
Confidentiality Correct Answer-Rules that restrict access to only those who need to know
Ensuring that only those people who need access to data have access to that data
Personal data, organisational data, government data
Integrity Correct Answer-Level of assurance which can be given as to the accuracy and trustworthiness of the data
Ensures data has not been altered
Enter incorrect data, errors made when updating data, hacking, viruses
Availability Correct Answer-Level of assurance that the data will be available to those who need it when they want it
Organisations will have higher availability
Personal - bank account (financial), address, national insurance number
Organisations - business plans, customer contracts, research Causes of inaccessible data - hardware/software malfunctions, malware, trojan
Unauthorised access Correct Answer-Gaining access to computer systems, networks and data without permission Hacking Correct Answer-Internal or external, gaining access to a computer system with no legitimate username or password
Unauthorised intrusion into a network
Escalation of privileges Correct Answer-Individuals have rights to access that normal users do not have
Vertical Escalation of Privileges Correct Answer-Invader obtains or may
have legally received permission for low level access to a computer system
Find flaws/weaknesses/vulnerabilities in security system/OS
Increase access level - networks, data files, usernames and passwords
Horizontal Escalation of Privileges Correct Answer-Invader gains access
to other normal users' areas
Information disclosure Correct Answer-Information held by organisations is one of their most valuable assess
Business plans, research, customer contracts
Personal - bank details, NI number, salary scale
Government - handwritten, digital, agents, soldiers - economic or national security Modification of data Correct Answer-Data entered, stored, deleted, amended by those with authorisation
Accidental - poor knowledge
Deliberate - tools to steal or destroy data
Cause disruption/harm to organisation
Inaccessible data Correct Answer-Users denied access to data/services that they need, even though they have the necessary permissions
Usually linked to malicious software
Account lockout
Denial of Service attack
Destruction (of data) Correct Answer-Destroy data intentionally
Malware - viruses, Trojan
May target specific data
Deliberate erasure
Theft (of data) Correct Answer-Hackers obtain access to specific info about individuals
Create new identity
Bank account - criminal transactions
The need to protect personal data Correct Answer-May result in ID theft
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R297,27. You're not tied to anything after your purchase.