Access over 20 million homework & study documents

Cyber Security.docx9

Content type
User Generated
Subject
Cyber Security
School
Morgan State University
Type
Homework
Rating
Showing Page:
1/3
Cyber Security
Name of student
Affiliation
Course code
Name of Professor
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
1. Danger, Vulnerability, and Risk Define each of them. Describe each of these three in the
form of an example scenario.
A threat is a malicious act that aims to steal information or destroy digital life in general.
Attack vectors, computer viruses, denial of service, and data breaches are all examples of
scenarios.
A vulnerability is a flaw in a computer system that can be exploited by a threat agent, such as
an actor, to cross privilege boundaries. Weak network management and end-point protection
are two examples. An attacker must have a method or technique that can be used to exploit a
device flaw.
Risk refers to the possibility of damage or data loss from an organization's system. Cyber-
attacks are an example of cyber threats.
2. Step 0 of the attack The attacker uploads material to an unpatched website. Identify three
critical controls that would prevent this attack and clarify how they would function.
To prevent the installation of malicious software and programs that may pose a threat to the
device, avoid clicking on links or downloading attachments from unknown sources.
Using a secure and up-to-date firewall to prevent large data files from being transferred over
the network and to block attachments that could contain malware.
Ensure that the operating system has the most recent security patches and that software
programs are updated on a regular basis to patch any holes or weaknesses.
3. Step 1 of the attack - The attacker uses the privileges of the user who ran the browse to
install programs of the attacker's choice on the victim computer. Identify three critical
controls that would prevent this attack and clarify how they would function.
By constantly updating your passwords, you can prevent someone from gaining access to
your credentials and thereby preventing the attack.
To improve your protection, use alpha numerics and complex combinations of letters in your
password and avoid using terms that are directly in the dictionary.
4. Step 2 of the attack - The attacker uses outbound HTTPS access from the victim to the
attacker. Identify three critical controls that would prevent this attack and clarify how they
would function.
To avoid being routed to malicious HTTPS entry, install advertising locker on your browsers
and use the AD locker.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Cyber Security Name of student Affiliation Course code Name of Professor Date 1. Danger, Vulnerability, and Risk Define each of them. Describe each of these three in the form of an example scenario. A threat is a malicious act that aims to steal information or destroy digital life in general. Attack vectors, computer viruses, denial of service, and data breaches are all examples of scenarios. A vulnerability is a flaw in a computer system that can be exploited by a threat agent, such as an actor, to cross privilege boundaries. Weak network management and end-point protection are two examples. An attacker must have a method or technique that can be used to exploit a device flaw. Risk refers to the possibility of damage or data loss from an organization's system. Cyberattacks are an example of cyber threats. 2. Step 0 of the attack – The attacker uploads material to an unpatched w ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4