Question

In: Computer Science

QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider...

QUESTION 1

Briefly describe how social engineering can be used to take advantage of unwitting insider threats

QUESTION 2

True or False - Insiders aren't threats unless they recently came from outside the organization

True

False

QUESTION 3

Why is spear phishing particularly relevant to the problem of insider threats?

                                It is specifically crafted to bypass firewalls

                                It is specifically crafted to target computers running the Windows operating system

                                It is specifically crafted to appear relevant to particular insiders

                                It is crafted by specifically talented insiders

QUESTION 4

Why is an insider threat potentially more serious than an external threat?

                                Insiders often already have access to sensitive information or restricted areas

                                Insiders have better social engineering skills

                                External threats aren't interested in industrial espionage but insiders are

                                External threats have comparatively weak technical skills

QUESTION 5

Industrial Espionage is most likely driven by which component of the MICE motivation acronym?

                                Ideology

                                Money

                                Coercion

                                Ego

QUESTION 6

Match each potential insider threat with the most likely motivation from the MICE motivation acronym

                Nurse that has a gambling problem

                Research Scientist being blackmailed

                Employee that believes their company is harming the environment

                Supervisor recently passed over for a promotion to manager

A.           

Ego

B.           

Money

C.           

Coercion

D.           

Ideology

QUESTION 7

Which type of malware is most closely related to the problem of insider threats?

                                Macro Virus

                                Trojan Horse

                                Worm

                                Spyware

QUESTION 8

True or False - The threats that insiders pose can be eliminated by using the right technologies

True

False

QUESTION 9

Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)

                                Availability

                                Least Privilege

                                Perimeter security

                                Confidentiality

                                Filtering

Solutions

Expert Solution

QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider threats

Answer -

  • Social Engineering is used to refer to the malicious activities that are caused with the help of human interaction. Attackers trick the humans to find a way into the system.
  • Unwitting Insider threat refers to that human who has access to the information and systems and who unknowingly passes the sensitive information related to the system or security.
  • Attackers in Social Engineering target the people inside the organization who have the relevant information and access. They try to first gain the trust and then they acquire the needed information from the insiders by tricking them.

QUESTION 2 True or False - Insiders aren't threats unless they recently came from outside the organization

Answer - False as attackers can also target them when they are inside the organization.

QUESTION 3 Why is spear phishing particularly relevant to the problem of insider threats?

  1. It is specifically crafted to bypass firewalls
  2. It is specifically crafted to target computers running the Windows operating system
  3. It is specifically crafted to appear relevant to particular insiders
  4. It is crafted by specifically talented insiders

Answer -  It is specifically crafted to appear relevant to particular insiders

QUESTION 4 Why is an insider threat potentially more serious than an external threat?

  1. Insiders often already have access to sensitive information or restricted areas
  2. Insiders have better social engineering skills
  3. External threats aren't interested in industrial espionage but insiders are
  4. External threats have comparatively weak technical skills

Answer - Insiders often already have access to sensitive information or restricted areas.

QUESTION 5 Industrial Espionage is most likely driven by which component of the MICE motivation acronym?

  1. Ideology
  2. Money
  3. Coercion
  4. Ego

Answer - Money : Espionage is the act of obtaining sensitive information without permission and Industrial Espionage is carried out generally by an organisation's competitors for commercial purposes.

QUESTION 6 Match each potential insider threat with the most likely motivation from the MICE motivation acronym

  1. Nurse that has a gambling problem
  2. Research Scientist being blackmailed
  3. Employee that believes their company is harming the environment
  4. Supervisor recently passed over for a promotion to manager

A. Ego

B. Money

C. Coercion

D. Ideology

Answer -

  1. B : Gambling is generally due to the money addiction.
  2. C : Coercion means to force somebody to do something.
  3. D : Employee's ideology has a negative view regarding the company.
  4. A : Promotion can lead to ego issues

QUESTION 7 Which type of malware is most closely related to the problem of insider threats?

  1. Macro Virus
  2. Trojan Horse
  3. Worm
  4. Spyware

Answer-   Spyware as Spyware is a generic term for any software(including Trojan Horse) that is designed to steal sensitive information from the user's system.

QUESTION 8 True or False - The threats that insiders pose can be eliminated by using the right technologies

Answer - False as the information passed by Insiders either knowingly or unknowingly can't be stopped with the help of technology.

QUESTION 9 Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)

  • Availability
  • Least Privilege
  • Perimeter security
  • Confidentiality
  • Filtering

Answer -

  1. Availability as the insider attack may lead to some data or information missing when needed.
  2. Least Privilege as the insider attack may lead to a person having more access than originally granted.

Related Solutions

1. If an insider cannot take advantage and trade on private information to make abnormal profits​...
1. If an insider cannot take advantage and trade on private information to make abnormal profits​ , then a market is likely to be​ considered A. Weak form efficient and Semi strong form efficient only B. Only Semi Strong form efficient C. Strong form efficient 2. You have placed a buy​ market-on-open order​ – a market order that would automatically be submitted at the​ market’s open tomorrow and would fill at the market price. Your​ instruction, to buy the shares...
How python can be used in civil engineering? please explain briefly
How python can be used in civil engineering? please explain briefly
What is Social Engineering and how can you detect it.
What is Social Engineering and how can you detect it.
Briefly describe internal control and how can it be used to protect assets. How can petty...
Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare Target Corporation's cash to its biggest competitor for the two years preceding the current year. What does the cash ratio help to...
Describe the reinforcement perspective and social learning theory and how they can be used to motivate...
Describe the reinforcement perspective and social learning theory and how they can be used to motivate employees. Provide sources if used.
Discuss how social advantage and health advantage are transmitted across lifetimes and generations. Describe the implications...
Discuss how social advantage and health advantage are transmitted across lifetimes and generations. Describe the implications for health care policy in addressing health.
Describe what a social engineering attack is. [Social engineering is the art of manipulating people so...
Describe what a social engineering attack is. [Social engineering is the art of manipulating people so they give up confidential information. The attackers solicits information such as passwords or PIN numbers from victims.] Provide 3 examples of social engineering attacks and describe how they could be used to undermine the security of your IT infrastructure. [ your answer goes here ] How can social engineering attacks be defended against? Provide 5 examples with descriptions. [ your answer goes here ]
Essay Questions Briefly describe internal control and how can it be used to protect assets. How...
Essay Questions Briefly describe internal control and how can it be used to protect assets. How can petty cash funds be used for internal control purposes? Why are bank accounts used? What is bank reconciliation, and why should a business use it? Why is it necessary to record journal entries after the bank reconciliation has been prepared? Calculate and compare your selected Target corporation's cash to its biggest competitor for the two years preceding the current year. What does the...
Give an example of how annealing is used in an engineering application. Also, briefly explain how...
Give an example of how annealing is used in an engineering application. Also, briefly explain how and why the mechanical properties—for a metal—of yield strength, ductility, hardness, Young’s modulus, ultimate tensile strength, and toughness are different for a cold worked metal vs a metal that has been annealed at a relatively high temperature for a relatively long time (must talk about grain size).
Briefly describe the cost-volume-profit analysis model and discuss how it can be used. Also, briefly explain...
Briefly describe the cost-volume-profit analysis model and discuss how it can be used. Also, briefly explain the limitation of basic cost-volume-profit analysis as it relates to an organization’s sales mix
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT