• Integrity Scalability Availability Confidentiality
  • 12. Can you identify the cyber attacker type from the following descriptions
  • Script kiddies 13. Stuxnet malware was designed for which primary purpose
  • Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?




    Download 16.87 Kb.
    bet3/3
    Sana22.08.2023
    Hajmi16.87 Kb.
    #79213
    1   2   3
    Bog'liq
    Introduction to Cybersecurity Module 1
    INFORMATIKA JAMLANMA 2022 tushganlar, Etiket kásip ruwxıylıǵınıń sırtqı mazmunı sıpatında., mahmudova-gulruh-zokir-qizi-mustaqil-ish, @IELTSmaterials N1 IELTS Reading (3), 2-O`quv topshiriq (1), sarvar 61, iclud, ILIM ZIYO matematiha , 11, Amonova Mahliyo Safarovna, 2-sinf Ona tili Shaxs va narsaning nomini bildirgan so’zlar dars ishlanma, 9-май Гулнора Азимова, BOSHLAN INTERFAOL METOD, Mantiqiy fiklash
    9. Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

    • Yes

    • No

    10. What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers)

    • Access

    • Integrity

    • Scalability

    • Availability

    • Confidentiality

    • Intervention

    11. Can you identify why each of the following organizations might be interested in your online identity?
    Internet service providers:
    – They may be legally required to share your online information with government surveillance agencies or authorities
    Advertisers:
    – To monitor your online activities and send targeted ads your way
    Social media platforms:
    – To gather information based on your online activity, which is then shared with or sold to advertisers for a profit
    Websites:
    – To track your activities using cookies in order to provide a more personalized experience
    12. Can you identify the cyber attacker type from the following descriptions?

    • Make political statements in order to raise awareness about issues that are important to them – Hacktivists

    • Gather intelligence or commit sabotage on specific goals on behalf of their government – State-sponsored attackers

    • Use existing tools on the Internet to launch a cyber attack – Script kiddies

    13. Stuxnet malware was designed for which primary purpose?

    Download 16.87 Kb.
    1   2   3




    Download 16.87 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

    Download 16.87 Kb.