Unit: Cybersecurity Fundamentals (Cit 4206) : Question One

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIT: CYBERSECURITY FUNDAMENTALS (CIT 4206)

Question one.
a) Explain the following terms. (6 marks)
i. Cybersecurity
This is the protection of information assets by addressing threats to the
information processed, stored and transported by internetworked information
systems (called cyberspace)
ii. Cyberspace
It is an interactive domain made up of digital networks that is used to store,
modify and communicate information. It includes the internet but also the other
information systems that support our companies, infrastructure and services.

iii. Cybercriminal
These are black hat hackers who are either self-employed or working for large
cybercrime organization. Each year, cyber criminals are responsible for stealing
billions of dollars from consumers and businesses.
iv. Cyberbullying
Acts in cyberspace intended to make life unpleasant for another person

v. Cyberattack
This is an assault launched by cybercriminals using one or more computers
against a single or multiple computers or networks. It can maliciously disable
computers, steal data or use a breached computer as a launch point for other
attacks
vi. Chief information security officer
A high-level management position responsible for the entire information security
division/staff. The position may include hands-on technical work.

b) State four reasons why cybersecurity is important to an organization (4


marks)
- To enable the safe operation of applications implemented on the organization’s IT
Systems.
- To protect the data the organization collects and uses.
- To safeguard the technology assets in use at the organization.
-To protect the organization’s ability to function

c) State any three differences and any two similarities between information
security and cybersecurity (10 marks)
Differences
Information security cybersecurity
-Protects electronic and physical -Protects electronic data only.
Data
-Protects against a more defined -Protects against a more extensive threat – all of
threat Cyberspace
-Protects against more channels – -Protects against one area – cyberspace
goes beyond cyberspace

Similarities
-Both are essential in protecting the information in your company.
-Both security systems should be incorporated into your organization to ensure that all
channels being used are secure and protected against any threat, corruption or misuse.
d) Explain the difference the following terms;
i. Physical security and personnel security
Personnel security is a security discipline that assesses the loyalty, reliability, and
trustworthiness of individuals for initial and continued eligibility for access to
classified information whereas physical security  describes security measures that
are designed to deny unauthorized access to facilities, equipment and resources
and to protect personnel and property from damage or harm (such
as espionage, theft, or terrorist attacks).
ii. White Hat hacker and Black Hat hacker
White hat hackers are ethical hackers who use their programming skills for good,
ethical and legal purposes while Black hat hackers are unethical criminals who
violate computer and network security for personal gain, or for malicious reasons,
such as attacking networks.
iii. Script kiddies and state-sponsored hacker (6 marks)
Script kiddies refers to teenagers or inexperienced hackers running existing
scripts, tools, and exploits that could cause harm whereas state-sponsored hackers
are depending on a person's perspective, these are either white hat or black hat
hackers who steal government secrets, gather intelligence, and sabotage networks.
e) Thwarting the cybercriminals is a difficult task and there is no such thing as a
“silver bullet” However, company, government and international
organizations have begun to take coordinated actions to limit or fend off
cyber criminals. Briefly, explain any three countermeasures for thwarting
cyber criminals (4 marks)
 Sharing cyber intelligence information. Business, government agencies and
countries now collaborate to share critical information about serious attacks to
critical targets in order to prevent similar attacks in other places. Many
countries have established cyber intelligence agencies to collaborate worldwide
in combating major cyberattacks.
 Creating comprehensive databases of known system vulnerabilities and attack
signatures (a unique arrangement of information used to identify an attacker’s
attempt to exploit a known vulnerability). Organizations share these databases
worldwide to help prepare for and fend off many common attacks.
 Establishing early warning sensors and alert networks. Due to cost and the
impossibility of monitoring every network, organizations monitor high-value
targets or create imposters that look like high-value targets. Because these high
value targets are more likely to experience attacks, they warn others of potential
attacks.

Question two
Authentication and non-repudiation are tools that system designers can use to
maintain system security with respect to confidentiality, integrity and
availability. Understanding each of these five concepts and how they relate to
one another helps security professionals design and implement secure
systems. Each component is critical to overall security, with the failure of any
one component resulting in potential system compromise.
Required:
a) Explain the term “confidentiality”, hence distinguish between “data
confidentiality” and “privacy” (4 marks)
Confidentiality –is the assurance that information is not disclosed to unauthorized
individuals, processes or devices.
Data confidentiality assures that private or confidential information is not made
available or disclosed to unauthorized individuals while Privacy assures that
individuals control or influence what information related to them may be collected
and stored and by whom and to whom that information may be disclosed.

b) Explain the term “integrity”. Hence distinguish between “Integrity data”


and “system integrity” (4 marks)
Integrity is the quality of an information system reflecting the logical correctness and
reliability of the operating system; the logical completeness of the hardware and software
implementing the protection mechanisms; and the consistency of the data structures and
occurrence of the stored data.
Data integrity: Assures that information and programs are changed only in a specified
and authorized manner while System integrity assures that a system performs its
intended function in an unimpaired manner free from unauthorized manipulation of the
system.
c)Explain the term “Authentication”. Hence state two ways of authenticating
users (4 marks)
Authentication is a security measure designed to establish the validity of a transmission,
message or originator.
Ways of authenticating user;
- Static biometrics-A person’s fingerprint, voice print or retinal scan
- Dynamic biometrics- Recognition by voice pattern, handwriting characteristics and
typing rhythm.
d)Explain the term “Availability” Hence using the five nines principle,
calculate the downtime in a year. (4 marks)
Availability is the timely, reliable access to data and information services for authorized
users.
99.999% downtime per year =5.26 minutes
e) Explain the term “Non-repudiation” Hence explain the two types of non-
repudiation (4 marks)
Non-repudiation is assurance the sender of data is provided with proof of delivery and
the recipient is provided with proof of the sender’s identity, so neither can later deny
having processed the data.
Types of Non-repudiation;
Non-repudiation, Origin- Proof that the message was sent by the specified party.
Non-repudiation, Destination- proof that the message was received by the specified
party.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy