100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber-Security Exam 1 Complete with A+ Graded Answers $9.59   Add to cart

Exam (elaborations)

Cyber-Security Exam 1 Complete with A+ Graded Answers

 3 views  0 purchase
  • Course
  • Institution

Cyber-Security Exam 1 Security Problem The value of the information on technology is more valuable than the technology itself Attacker's Profile Generally inexperienced young people, script kiddies Electronic Crime When the computer is a target, or a computer is used to commit the cri...

[Show more]

Preview 2 out of 8  pages

  • April 18, 2024
  • 8
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Cyber-Security Exam 1
Security Problem
The value of the information on technology is more valuable than the technology itself


Attacker's Profile
Generally inexperienced young people, script kiddies


Electronic Crime
When the computer is a target, or a computer is used to commit the crime


Targets of Opportunity
A hacker attacks a vulnerability, not necessarily the company itself


Specifically Targeted Attacks
Driven by a purpose, a hacktivist


Structured Threats
Planned, more funded, longer periods of activity


Unstructured Threats
Less funded, shorter periods of time, fewer people


Difficulties in Defending Against Attacks
Increased speed, sophistication, availability of attacks


Security vs. Convenience
The higher the security level the lower the convenience


Confidentiality
Security actions that ensure that only authorized parties can view the information and prevents the
disclosure to others.


Integrity
Security actions that ensure that the information is correct and no unauthorized person or malicious
software has altered that data.


Availability
Security actions that ensures that data is accessible to authorized users.


Layers of Information Security
Confidentiality, integrity, availability


Laws Protecting Electronic Data Privacy

, HIPPA, Sarbanes-Oxley Act of 2002, Gramm-Leach-Bliley Act, California Database Security Breach


Cyber-Terrorism
Attacks may be ideologically motivated


Targets of Cyber-Terrorism
Banking, military, energy, transportation, water


Cybercriminals
A generic term used to describe individuals who launch attacks against other users and their
computers; also describes a loose-knit network of attackers, identity thieves, and financial fraudsters.


Script Kiddies
Individuals who want to break into computers to create damage yet lack the advanced knowledge of
computers and networks needed to do so.


Comprehensive Security Strategy
Block attacks, update defenses, minimize losses, send secure information


Social Engineering
A means of gathering information for an attack by relying on the weaknesses of individuals.


Phishing
Sending an e-mail or displaying a web announcement that falsely claims to be from a legitimate
enterprise in an attempt to trick the user into surrendering private information.


Shoulder Surfing
Viewing information that is entered by another person.


Dumpser Diving
Digging through trash receptacles to find information that can be useful in an attack.


Key Logger
Hardware or software that captures and stores each keystroke that a user types on the computer's
keyboard.


Man-In-The-Middle


Offline Cracking


Dictionary Attack
A password attack that compares common dictionary words against those in a stolen password file.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.59
  • (0)
  Add to cart