|
1. Which of the following methods is used to check the integrity of data?
|
bet | 2/3 | Sana | 22.08.2023 | Hajmi | 16.87 Kb. | | #79213 |
Bog'liq Introduction to Cybersecurity Module 1 INFORMATIKA JAMLANMA 2022 tushganlar, Etiket kásip ruwxıylıǵınıń sırtqı mazmunı sıpatında., mahmudova-gulruh-zokir-qizi-mustaqil-ish, @IELTSmaterials N1 IELTS Reading (3), 2-O`quv topshiriq (1), sarvar 61, iclud, ILIM ZIYO matematiha , 11, Amonova Mahliyo Safarovna, 2-sinf Ona tili Shaxs va narsaning nomini bildirgan so’zlar dars ishlanma, 9-май Гулнора Азимова, BOSHLAN INTERFAOL METOD, Mantiqiy fiklashSocial security number
Driver license number
Date and place of birth
Job title
IP address
Explanation: Personal data describes any information about you, including your name, social security number, driver license number, date and place of birth, your mother’s maiden name, and even pictures or messages that you exchange with family and friends.
5. Why might internal security threats cause greater damage to an organization than external security threats?
6. Which of the following is a key motivation of a white hat attacker?
Taking advantage of any vulnerability for illegal personal gain
Fine tuning network devices to improve their performance and efficiency
Studying operating systems of various platforms to develop a new system
Discovering weaknesses of networks and systems to improve the security level of these systems
7. An individual user profile on a social network site is an example of an ______ identity.
8. Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What level of cyber protection does each of the following factors require?
Your online identity – Personal
A customer database – Organizational
Economic stabilty – Government
|
| |