Question

In: Computer Science

Any Answer is appreciated. Thanks so much! QUESTION 15 "If an attacker wanted to cause serious...

Any Answer is appreciated. Thanks so much!

QUESTION 15

  1. "If an attacker wanted to cause serious damage in the real world, which of the following systems would be the most likely target?"

SCUBA systems

SCAPA systems

SCODA systems

SCADA systems

QUESTION 19

  1. Which of the following is often described as the weak link in cybersecurity defenses?

Firewalls

Intrusion Detection

People

Money

3 points   

QUESTION 20

  1. "Attackers will inspect, observe, and survey a target in order to build a(n) __________ that will be useful in determining a plan of attack"

Logbook

Footprint

Thumbprint

Imprint

3 points   

QUESTION 21

  1. How do security assessments help to improve overall security?

They allow an organization to evaluate the quality of its security protections in order to address any weaknesses before they can be exploited by an attacker

They allow an organization to evaluate the quality of its security protections in order to save money where possible

"They force an organization to make security a larger focus, essentially guaranteeing they meet requlatory requirements"

They're not - Security assessments are what hackers use to determine the best way to attack an organization's systems

QUESTION 27

  1. Choose the three main areas of exposure that make up an overall Attack Surface

Network

Attacker

People

Firewalls

Software

QUESTION 31

  1. Which cryptographic operation can you use to determine if the contents of a file have been tampered with?

Baking

Figuring

Shambling

Hashing

2 points   

QUESTION 33

  1. "Why are APTs typically identified as governments, or large, well-funded organizations?"

They are the only groups that have the legal authority from the UN to launch advanced persistent attacks

They are typically the only groups with the financial and technical resources to be able to sustain attacks on a long term basis

They are typically the only groups that are forced to be persistent in their pursuit of security

They are required by the UN to develop an adanced and persistent defense system to thwart terrorist organizations

Solutions

Expert Solution

Ans15) Scada system can allow attacker to cause damage in real world because Scada system are basically used for analyzing the real time data and also helps us to gather real time data so if they are exploited they can be used to cause damage in real world.They are used in many industries like telecommunication, transportation, oil refinery etc.

Ans 19)the main weak link is PEOPLE because many people working in different organization or individuals try to steal password of their seniors either by looking their password behind the wall or using some camera. Also many people sell their company weakness in terms of cyber security to attackers. Also many people attack on their company in which they are working to get some useful data .

Ans20) Footprint is used to create detailed information about the target or the victim so as to choose better strategies in exploiting. Attacker footprint the target software or victim to get detailed information about technology, software , encryption used etc.

Ans21) Security assessment allow organization to evaluate the quality of its security protections in order to address any weaknesses before they can be exploited by an attacker. Security assessment helps in finding vulnerability in the system so it can be patched and lot of sensitive data doesn't get compromised by attacker.

Ans27)The three main target that can cause the overall attack surface are People, Network and Attacker. Attacker is necessary to launch an attack via network bypassing all firewall to the target people so their software can be exploited.

Ans31) Hashing allows us to check whether data has been tempered or not. hash values are defined by companies or the owner so if there is change in hash value after downloading then one can say by comparison with the original hash values that the data has been tampered.

Ans33)Apt's are  typically the only groups with the financial and technical resources to be able to sustain attacks on a long term basis. These threat vectors are generally related to politics or are economic. They are done in order to get sensitive information about other government so as to lower them or to gain huge amount of money so they are generally done by government or large funded organization.


Related Solutions

need a detailed answer so much. Thanks a lot! The question is: "Describe the difference between...
need a detailed answer so much. Thanks a lot! The question is: "Describe the difference between diffraction and dispersion, by discussing the different physical processes (for example refraction) that give rise to the two phenomena."
Please Reply with an answer as soon as possible, will appreciate it so much. Thanks in...
Please Reply with an answer as soon as possible, will appreciate it so much. Thanks in advance. Case Problem: You are a HR assistant manager in a company employing many expatriates from around the world. Your company has selected ‘FutureFunds Pension Planners’ to provide your employees with an international pension plan that takes advantage of tax laws. The plan allows the company to make tax free contributions to the employee pension funds. It also allows Individuals enrolling in the plan...
Please explain your answer. Thanks so much!! Suppose that you had to explain to a person...
Please explain your answer. Thanks so much!! Suppose that you had to explain to a person (who is not an economist) why a current account deficit must be accompanied by a financial or capital account surplus. What would you say?
This is 1 java question with its parts. Thanks so much! Create a class named Student...
This is 1 java question with its parts. Thanks so much! Create a class named Student that has fields for an ID number, number of credit hours earned, and number of points earned. (For example, many schools compute grade point averages based on a scale of 4, so a three-credit-hour class in which a student earns an A is worth 12 points.) Include methods to assign values to all fields. A Student also has a field for grade point average....
Describe the cause of hydrocephalus and explain why this condition is much more serious in adults...
Describe the cause of hydrocephalus and explain why this condition is much more serious in adults than in newborns
If you could answer all 4 that would be greatly appreciated, thanks 1. Hull Company reported...
If you could answer all 4 that would be greatly appreciated, thanks 1. Hull Company reported the following income statement information for the current year: Sales $ 413,000 Cost of goods sold: Beginning inventory $ 136,500 Cost of goods purchased 276,000 Cost of goods available for sale 412,500 Ending inventory 147,000 Cost of goods sold 265,500 Gross profit $ 147,500 The beginning inventory balance is correct. However, the ending inventory figure was overstated by $23,000. Given this information, the correct...
This is 1 java question with 3 parts/codes called student.java, ShowStudent.java, ShowStudent2.java. Thanks so much! Create...
This is 1 java question with 3 parts/codes called student.java, ShowStudent.java, ShowStudent2.java. Thanks so much! Create a class named Student that has fields for an ID number, number of credit hours earned, and number of points earned. (For example, many schools compute grade point averages based on a scale of 4, so a three-credit-hour class in which a student earns an A is worth 12 points.) Include methods to assign values to all fields. A Student also has a field...
ANSWER ANY 2 PLEASE. Q: Why do we spend so much time on internal control for...
ANSWER ANY 2 PLEASE. Q: Why do we spend so much time on internal control for cash receipts and disbursements? Shouldn’t we be just as concerned over other assets? Expenses? Revenue? Liabilities? Q: A grocery store decides to install a point-of-sale system that will allow the customer to use his or her ATM card to pay for merchandise at the checkout line. Previously, the grocery store has accepted only cash and checks as payment. Identify the control risk associated with...
ANY ANSWER WOULD BE A GREAT CONTRIBUTION.....THANK YOU SO MUCH In 2014 Energy Transfer Partners announced...
ANY ANSWER WOULD BE A GREAT CONTRIBUTION.....THANK YOU SO MUCH In 2014 Energy Transfer Partners announced a plan to carry 570,000 barrels of crude oil per day from the Bakken oil fields in North Dakota to an existing infrastructure in Illinois. The Dakota Access Pipeline, as it has been named, would snake across 1,172 miles to reach its destination while crossing through many states, a Native American Reservation, and come in contact with multiple waterways. Environmentalist and Native Americans have...
Please answer each question and show calculation/ provide explanations. Thank you so much. Question 1 You...
Please answer each question and show calculation/ provide explanations. Thank you so much. Question 1 You have just been hired as the staff accountant for Maximum Corporation. However, the accounting manager is unclear about your ability to determine where certain increases and decreases should be placed. Indicate in the columns below by placing a check-mark (√        ) in the appropriate column identified. Office rent is increased.                                   Service Revenue is increased. Prepaid Expense is reduced. Cash is decreased. Plant and machinery...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT