1. Why is phishing, and social engineering generally, difficult to address or prevent with technological controls? 2. An internet site starts distributing a program that gets a popular word processor...


1. Why is phishing, and social engineering generally, difficult to address or prevent with
technological controls?
2. An internet site starts distributing a program that gets a popular word processor to send a
copy of whatever files it produces to be emailed to a specific email address. Is this a
vulnerability, an exploit, or a security incident?
3. Briefly explain the Cyber-Risk function below:
���� ≜ � { Threats , Vulnerability,Asset Value}
4. What is a hash function, and what can it be used for?
5. a. A Banking systems analysts is reported to siphoning a customer’s account. Briefly
discuss if this is a vulnerability, an exploit or a security incident?
b. Based on the Asset Value, briefly discuss the statement: “Computer security should be
periodically reassessed”. You may be guided by the urgency and criticality of the
information assets.
6. Briefly discuss the extent to which insiders or “frenemies” may pose security challenges
to the organization.
7. What is a cryptographic key, and what is it used for?
8. What is an open port? Why is it important to limit the number of open ports a system has
to only those that are absolutely essential?



Jun 09, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here