100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Foundations of Cyber Security Questions and Answers 2024 R241,74   Add to cart

Exam (elaborations)

Foundations of Cyber Security Questions and Answers 2024

 5 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Foundations of Cyber Security

Preview 2 out of 12  pages

  • September 17, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
Foundations of Cyber Security

What is cyberspace? (4) - answer Information systems, data on them, services they
provide, network device used for communication

What is a cyberattack? - answer Malicious attempt to damage, disrupt, or gain
unauthorized access to computer systems, network or devices

What is a cyber vulnerability? (2) - answer Weakness or loophole in system

What is cyber security? - answer Protection of cyberspace from harm, misuse, or
unauthorized access

UK's National Cyber Security Strategy - answer Defend, deter, develop

Who can be behind cyber-attacks? (5) – answer Cyber criminals, nation states,
hacktivists, insider threats, script kiddies/noobs

Cyber criminal's typical motive - answer Money

Cyber criminal's typical attacks (5) - answer Money theft, document ransom, data
breach, DDoS

DDoS - answer Distributed Denial of Service

Cyber criminal's typical attack vectors (3) - answer Malware, email, botnet

Cybercriminal example - answer Albert Gonzalez, 2005-2007

Nation state's typical motives (3) - answer Collecting information, sabotage, subversion

Nation state's typical attacks (3) - answer Influencing campaigns, data breach, DDoS

Nation state's typical attack vectors (4) - answer Malware, botnets, emails, social media

Nation state examples (5) - answer US election, China's Marriott hack, Stuxnet,
Ukraine, Estonia

Hacktivist motives (3) - answer Religious, social, and political

Hacktivist typical attacks (4) - answerWeb defacement, data breach, information leak,
DDoS

, Hacktivist typical attack vector (3) - answerMalware, email, botnet

Hacktivist examples (2) - answerAnonymous, Snowden

Insider threat - answerComes from someone with legitimate access to resources

Insider threat motives (3) - answerPersonal vendetta, bribe, blackmail

Types of insider threat (2) - answerIntentional and unintentional

Intentional insider typical attacks (2) - answerInformation leak, install a logic bomb

Unintentional insider typical attacks (3) - answerAccidental posting/deleting information,
visit websites infected with malcode

Script Kiddies/Noobs - answerLess skilled hackers

Script Kiddies/Noobs motives (3) - answerDesire to join real groups, challenge, curiosity

Insider threat examples - answerSnowden, Manning, Reality Winner

Script Kiddie example - answerTalkTalk 2015

Kill chain stages (7) - answerReconnaissance
Weaponize
Delivery
Exploitation
Installation
Command-and-control
Actions on objectives

Reconnaissance - answerTarget research and selection, ends when attacker knows
enough

Reconnaissance example - answerIdentifying the security means used by the target via
online research

Weaponize - answerDevelopment or purchase of cyber weapons

Weaponize examples (3) - answerMalicious payload, social engineering, remote access
trojan

Delivery - answerDelivery of payload to target

Delivery examples (3) - answerTarget downloads from website, USB, email attachment

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R241,74. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

66579 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling

Recently viewed by you


R241,74
  • (0)
  Buy now