100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Top 50 Cybersecurity Questions and Answers Rated A+ $16.49   Add to cart

Exam (elaborations)

Top 50 Cybersecurity Questions and Answers Rated A+

 7 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Top 50 Cybersecurity Questions and Answers Rated A+ Define Cybersecurity? Cybersecurity refers to the protection of internet-connected systems such as software, hardware, electronic data, etc., from cyber attacks. In a computing text, it is referred to as protection against unauthorized access. ...

[Show more]

Preview 2 out of 11  pages

  • September 17, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
julianah420
Top 50 Cybersecurity Questions and
Answers Rated A+


Define Cybersecurity? - Cybersecurity refers to the protection of internet-connected
systems such as software, hardware, electronic data, etc., from cyber attacks. In a
computing text, it is referred to as protection against unauthorized access.

What is Cryptography? - Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the information from third parties for
whom data is not authorized.

What is the difference between Threat, Vulnerability, and Risk? - Threat: Someone with
the potential to cause harm by damaging or destroying the official data to a system or
organization.
Ex: Phishing attack

Vulnerability: It refers to weaknesses in a system that makes threat outcomes more
possible and even more dangerous.
Ex: SQL injections, cross-site scripting

Risk: It refers to a combination of threat probability and impact/loss. In simple terms, it is
related to potential damage or loss when threat exploits the vulnerability

An asset is what we're trying to protect.
Threat - Anything that can exploit a vulnerability, intentionally or accidentally, and
obtain, damage, or destroy an asset.
A threat is what we're trying to protect against.
Vulnerability - Weaknesses or gaps in a security program that can be exploited by
threats to gain unauthorized access to an asset.
A vulnerability is a weakness or gap in our protection efforts.
Risk - The potential for loss, damage or destruction of an asset as a result of a threat
exploiting a vulnerability.
Risk is the intersection of assets, threats, and vulnerabilities.

What is Cross-Site Scripting and how it can be prevented? - Cross-Site Scripting is also
known as a client-side injection attack, which aims at executing malicious scripts on a
victim's web browser by injecting malicious code.
The following practices can prevent Cross-Site Scripting:
Encoding special characters
Using XSS HTML Filter

, Validating user inputs
Using Anti-XSS services/tools

What is the difference between IDS and IPS? - Intrusion Detection Systems (IDS)
It only detects intrusions but unable to prevent intrusions.
It's a monitoring system.
It needs a human or another system to look at the results.

Intrusion Prevention Systems (IPS)
It detects and prevents intrusions.
It's a control system.
It needs a regularly updated database with the latest threat data.

What is a Botnet? - A Botnet is a group of internet-connected devices such as servers,
PCs, mobile devices, etc., that are affected and controlled by malware.
It is used for stealing data, sending spam, performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the user to access the device and its
connection.

What is a CIA triad? - CIA (confidentiality, integrity, and availability) triad is a model
designed to handle policies for information security within an organization.

Confidentiality - A collection of rules that limits access to information.

Integrity - It assures the information is trustworthy and reliable.

Availability - It provides reliable access to data for authorized people.

What is the difference between hashing and encryption? - Both hashing and encryption
are used to convert readable data into an unreadable format. The significant difference
is that encrypted data can be transformed into original data by decryption, whereas
hashed data cannot be processed back to the original data.

What is two-factor authentication and how it can be implemented for public websites? -
Tw0-factor authentication is also referred to as dual-factor authentication or two-step
verification where the user provides two authentication factors for protecting both user
credentials and resources while accessing.

The two-factor authentication can be implemented on public websites such as Twitter,
Microsoft, LinkedIn, and more for enabling another protection on your already protected
account with a password.

For enabling this double factor authentication, you can easily go to settings and then
manage security settings.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$16.49
  • (0)
  Add to cart