0 ratings 0% found this document useful (0 votes) 6 views 5 pages Moccs PDF 1 Assignment
The document discusses the fundamentals of cybersecurity, including various types of cyber attacks such as malware, social engineering, and network-based attacks. It emphasizes the importance of security policies, risk management, and the CIA triad (Confidentiality, Integrity, Availability) in protecting systems and data. Additionally, it defines key concepts like vulnerabilities and computer criminals, highlighting their impact on organizational security.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save moccs pdf 1 assignment For Later
4 What do You vmean Cy box Seeuso'iy + Explin yoru oud
: Cybex Secuxity _ :
eK tundamentaly 04 Cybex. seewniy
4+/_Nekoootk Security > _fotodtecting _ Combuteo__netuanatk tem,
ry . U
tmauthosazed _actess , migate 1 Orel
dissuption_acortcing to Cheek point So/tudaxe
i g
2: Cloud
applications 1_aral
on Cloud. plat fostms
Applicadfon
ting Ha _Seensurty af Sefroceee
opp lication —aeughaut- Thee life tyle
Quu-Q-| Who axe. the —_oliffowrt _Categosuitg cf _Cybere
attack? Explain in _detail *
4: Mal woxe + Based Attacks
+ Malware + Spy eons.
+ | Viotasep © Aduwaxe
* | Woutms * Back oloowrg
: Trojans + Coypto jacking
+ RanSemuaxe| Social Engines suing Attacks ———
Phishing. is ii
_ Email — Spoofing Be
Cybex espionage a
Account _Compstomnise a
S| Nekoowk — ‘Based Attacks
«| Denial =f - Sewice CDos)
© «| disdoubuted _domial - af ~ Sotvice CD Dos attacks
«| Man= in = dhe - middle (Mitr) attacks
+| ARP Spoofing CAaldrtoss Rag olution _Rxodoeal )
+! Bodnets
© | Command, anol _conksial
4:| Web - Based Attacks
*| Cutoss - Site Si
=| $QL_inj
© =| foamjacking
*| Click jacking
Gua 3+ Define tie. following
a), Vuln ext.a bility — A ul nenerb bity ts
weakness 0% law in
stem 1 Sop-taaxe thas unre 102 axganizationl
process that an be @xplotfed by 10 Fhsteot-
to gain unauthoezed _ access _, cause dlamag 2)
d, _ Actions -
spting CX
attacks
NS edoxm _unciuthoIz¢
ie
REDMI 12 5G RAVINDER WAC =¥ (yA 0V AsmaSimple “Dyfinstion.- Vulnew ability is va, weakness
that —rmkeg a System On
00{g avi zaction, Susceptible 4o_hasim O20 attack -
b) Computer __Cstiminals 2- omputer _ csuim inal
Calse Known a4 Cybex Criminals)
Qe, individuals _an.___greups tho Os, Computers,
net wootks + O35 digital davices fo commit
illegal activities ___typical ——
unaut-hastized acess + data. the} 1 Paud ’
oot disse upton of Ly Stem$ «
| Common Cerimes by Computer Criminals !-
: oe tnto Sq Stems
* | financial _Jotaud and. _ Stealirg _Gowal mad dada
bueachs Onde infosimation leaks
Denial - of Qos) attacks
the (TA @uiael__in__Cybex_Secusuty-
tohy iss ft Consiclesce| the. gpeundation of
’ 9
falostmation__ Secuserty
CIA Guad *
lo nfident iabity
Dk egru'ty
Availabiliiy
Woe a
IREDMI 12 5G | RAVINDE 17/08/2025 1+ fayjiderctiabity —> Engusiny — thot Vafostmad en
| Als. accessible ©
authostized to hava. _actegs+ oe
+ | Crook * Prevent unauthase'zed altel osusie Of lado.
Gxomple!- + Ente Y Ption
+ Access “Contste _C user na meg [prsswooda ,
biometouics.)
+ Network Secusuity Mees used
a Tre grity —_ Ensusuing the Accuxamey anal
ss Com plet hema of data, _ovex. its
pnauthosi'zed — Medliitedisag —and)
when dota is __alttertedl =
|, hash — functions (SHA = 250)
Pocuvant
—> _ Ensuxing thet out: hestizedl useny,
shave ealiable anol timely -
and _dystem Whur hocdleel *
fi anal dota
otmedion
i
keep Cysctems —rermmin
keep Sysden 5
acres
e | (rool -
accessible *
ed, undone
Jer- + Rec _u 4
Erm e Pos _patetectton
ster rmoink enue
7 2 )
backups —+ forlover Systems)
and _opdates
REDMI 12 5G RAVINDER 17/08/2025 10:(oS Elabostate — vasuoua Secusa'ty policies in dedatl
, Securit policies “are. imposetant f'n
do Scerau’o
ara | Sec wa'ty policies oxte _ Yostnat ewstten
documents "that Cuttin” how an
stg ani zation manages» _paat ects, anal
ois td buteg lotmecton - Thay __pstevidle
} diseetiar | employees and. TT teams
ye 4d ensue Gngistent anol ef ective
Beusity —_prta ch'ceg
ap Secusu'ty policies in Today
(Cybex Thoreats + (with susing C4bex
: atocké dike ensename
adacka , Clear policies -
iano D
| Sensitive Dota _» Pol ees help
Sa e quarts pewsonal, 4 inar
doda._dgalr wt unauthassze o
@ 2. Protection
and intelectual
onl __bstanchea
ZB: Risk Management: * By defining prwced ae
‘ Barat step Dow ities _¢ policies
reduce He Jikeliheoa, aol, impach co} Seewuity intielend
y.| Bussiness Continuity _* poli cies __halp minimize
la mage anol. mealntes'n 6 )pencdren =
AKOYA