Question

In: Computer Science

Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in...

Subject: Introduction to Cyber Security

Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words.

  1. Explain how that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks.. Discuss how operationally, the security engineer performs threat and vulnerability assessments to identify security risks, and then regularly updates the security controls identified through those assessments.Examine the tools needed by a digital forensics professional to collect digital evidence and write a brief 250 word report

Solutions

Expert Solution

Cyber security

————————-

​​​​​​ We are living in a digital era,weather it will be booking a hotel room,booking a movie theater even booking a cab .we are using internet and generate data.The data is generally stored in cloud,basically a huge servers or in a dataset.also we use some devices to access data.

Now for an hacker,it’s a golden age,publicly available IP address and so on.So they can exploits vulnerability and can create malicious software.

There are so many types of cyber attacks.

1.MAlWARE

   MAlWARE or malicious software,is any program or file that is harmful to computer user.malware includes computer viruses,worms,Trojan horses and spyware.These malicious programs can perform a verity of functions such as stealing,encrypting or deleting data.

2.PHISHING

   Phishing is a cyber attack , in that it tries to steal users sensitive informations such as usernames ,passwords,credit and debit card details etc.It is obtained by email spoofing or by instant messaging.Here attacker will redirect the users to a website that is look like an original website that the user want to access.And record the actions that the user doing there.and use it for unwanted purposes.

3.MAN IN THE MIDDLE ATTACK

     a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.for example Suppose Alice wishes to communicate with Bob. Meanwhile, Jenny  wishes to intercept the conversation and to deliver a false message to Bob.Jenny will secretly relay between them and alters the conversation data.But the original communicators never know this.

4. DENIAL OF SERVICE ATTACK

denial-of-service attack (DoS attack) is a cyber-attack in which a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine by sending overloaded requests and prevent some or all legitimate requests from being fulfilled

How to prevent cyber attacks

To prevent cyber attacks we must give proper training for the employees to identify the attacks and how to deal with those attacks. For that we can create a group of personals to take in charge the responsibility and give proper guidance to the team.Give special tools and methods to find the attacking.Install and use regular updated antivirus software.Take proper back up of important data.Download and install updates of operating system and applications.Controls physical access to your computer and network components.Regularly change passwords and use a strong one.


Related Solutions

Conduct an internet search on how to build a web portal ? no copy subject e-...
Conduct an internet search on how to build a web portal ? no copy subject e- portals development
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist? need reference or citation for these questions
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction:...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction: IN C PROGRAMMING For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The...
Please do not copy from other post or the copy from the web Creating Sunburst: Legal...
Please do not copy from other post or the copy from the web Creating Sunburst: Legal and Organizational Considerations Ravi, who has a degree from State University in mechanical engineering, was previously employed by a start-up firm in New York City. He worked long hours for little pay, but when the business sold, his stock options paid off. As a result, he now has some time and $100,000 to invest in Sunburst. More importantly, Ravi has the knowledge and know-how...
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your...
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your team think about whether it is needed/not needed? Important/not important? A security risk/not a risk? Any security implications? Please, need reference or citation!
please please do not copy the answer from internet A capacity alternative has an initial cost...
please please do not copy the answer from internet A capacity alternative has an initial cost of $75,000 and $35,000 salvage value. It creates cash flow (income) of $15,000 for each of the next five years. If the cost of capital is 12 percent (i =12%), what is the net present value of this investment?
Video Response 8.1 - "Search and Seizure" Instructions please do not copy and paste from internet-answer...
Video Response 8.1 - "Search and Seizure" Instructions please do not copy and paste from internet-answer based on the video-thanky ou Write a 200- to 400-word essay about the most important thing you learned while watching "Search and Seizure." video: you can find it easily by typing: Search and Seizure: Crash Course Government and Politics #27 or link if needed: https://www.youtube.com/watch?v=_4O1OlGyTuU&list=PL8dPuuaLjXtOfse2ncvffeelTrqvhrz8H&index=27
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion...
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented. Post between 300 and 400 words.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT