0% found this document useful (0 votes)
6 views5 pages

Moccs PDF 1 Assignment

The document discusses the fundamentals of cybersecurity, including various types of cyber attacks such as malware, social engineering, and network-based attacks. It emphasizes the importance of security policies, risk management, and the CIA triad (Confidentiality, Integrity, Availability) in protecting systems and data. Additionally, it defines key concepts like vulnerabilities and computer criminals, highlighting their impact on organizational security.

Uploaded by

yadavgisu6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

Moccs PDF 1 Assignment

The document discusses the fundamentals of cybersecurity, including various types of cyber attacks such as malware, social engineering, and network-based attacks. It emphasizes the importance of security policies, risk management, and the CIA triad (Confidentiality, Integrity, Availability) in protecting systems and data. Additionally, it defines key concepts like vulnerabilities and computer criminals, highlighting their impact on organizational security.

Uploaded by

yadavgisu6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
4 What do You vmean Cy box Seeuso'iy + Explin yoru oud : Cybex Secuxity _ : eK tundamentaly 04 Cybex. seewniy 4+/_Nekoootk Security > _fotodtecting _ Combuteo__netuanatk tem, ry . U tmauthosazed _actess , migate 1 Orel dissuption_acortcing to Cheek point So/tudaxe i g 2: Cloud applications 1_aral on Cloud. plat fostms Applicadfon ting Ha _Seensurty af Sefroceee opp lication —aeughaut- Thee life tyle Quu-Q-| Who axe. the —_oliffowrt _Categosuitg cf _Cybere attack? Explain in _detail * 4: Mal woxe + Based Attacks + Malware + Spy eons. + | Viotasep © Aduwaxe * | Woutms * Back oloowrg : Trojans + Coypto jacking + RanSemuaxe | Social Engines suing Attacks ——— Phishing. is ii _ Email — Spoofing Be Cybex espionage a Account _Compstomnise a S| Nekoowk — ‘Based Attacks «| Denial =f - Sewice CDos) © «| disdoubuted _domial - af ~ Sotvice CD Dos attacks «| Man= in = dhe - middle (Mitr) attacks +| ARP Spoofing CAaldrtoss Rag olution _Rxodoeal ) +! Bodnets © | Command, anol _conksial 4:| Web - Based Attacks *| Cutoss - Site Si =| $QL_inj © =| foamjacking *| Click jacking Gua 3+ Define tie. following a), Vuln ext.a bility — A ul nenerb bity ts weakness 0% law in stem 1 Sop-taaxe thas unre 102 axganizationl process that an be @xplotfed by 10 Fhsteot- to gain unauthoezed _ access _, cause dlamag 2) d, _ Actions - spting CX attacks NS edoxm _unciuthoIz¢ ie REDMI 12 5G RAVINDER WAC =¥ (yA 0V Asma Simple “Dyfinstion.- Vulnew ability is va, weakness that —rmkeg a System On 00{g avi zaction, Susceptible 4o_hasim O20 attack - b) Computer __Cstiminals 2- omputer _ csuim inal Calse Known a4 Cybex Criminals) Qe, individuals _an.___greups tho Os, Computers, net wootks + O35 digital davices fo commit illegal activities ___typical —— unaut-hastized acess + data. the} 1 Paud ’ oot disse upton of Ly Stem$ « | Common Cerimes by Computer Criminals !- : oe tnto Sq Stems * | financial _Jotaud and. _ Stealirg _Gowal mad dada bueachs Onde infosimation leaks Denial - of Qos) attacks the (TA @uiael__in__Cybex_Secusuty- tohy iss ft Consiclesce| the. gpeundation of ’ 9 falostmation__ Secuserty CIA Guad * lo nfident iabity Dk egru'ty Availabiliiy Woe a IREDMI 12 5G | RAVINDE 17/08/2025 1 + fayjiderctiabity —> Engusiny — thot Vafostmad en | Als. accessible © authostized to hava. _actegs+ oe + | Crook * Prevent unauthase'zed altel osusie Of lado. Gxomple!- + Ente Y Ption + Access “Contste _C user na meg [prsswooda , biometouics.) + Network Secusuity Mees used a Tre grity —_ Ensusuing the Accuxamey anal ss Com plet hema of data, _ovex. its pnauthosi'zed — Medliitedisag —and) when dota is __alttertedl = |, hash — functions (SHA = 250) Pocuvant —> _ Ensuxing thet out: hestizedl useny, shave ealiable anol timely - and _dystem Whur hocdleel * fi anal dota otmedion i keep Cysctems —rermmin keep Sysden 5 acres e | (rool - accessible * ed, undone Jer- + Rec _u 4 Erm e Pos _patetectton ster rmoink enue 7 2 ) backups —+ forlover Systems) and _opdates REDMI 12 5G RAVINDER 17/08/2025 10:( oS Elabostate — vasuoua Secusa'ty policies in dedatl , Securit policies “are. imposetant f'n do Scerau’o ara | Sec wa'ty policies oxte _ Yostnat ewstten documents "that Cuttin” how an stg ani zation manages» _paat ects, anal ois td buteg lotmecton - Thay __pstevidle } diseetiar | employees and. TT teams ye 4d ensue Gngistent anol ef ective Beusity —_prta ch'ceg ap Secusu'ty policies in Today (Cybex Thoreats + (with susing C4bex : atocké dike ensename adacka , Clear policies - iano D | Sensitive Dota _» Pol ees help Sa e quarts pewsonal, 4 inar doda._dgalr wt unauthassze o @ 2. Protection and intelectual onl __bstanchea ZB: Risk Management: * By defining prwced ae ‘ Barat step Dow ities _¢ policies reduce He Jikeliheoa, aol, impach co} Seewuity intielend y.| Bussiness Continuity _* poli cies __halp minimize la mage anol. mealntes'n 6 )pencdren = AKOYA

You might also like