1. Why is phishing, and social engineering generally, difficult to address or prevent withtechnological controls?2. An internet site starts distributing a program that gets a popular word processor to send acopy of whatever files it produces to be emailed to a specific email address. Is this avulnerability, an exploit, or a security incident?3. Briefly explain the Cyber-Risk function below:���� ≜ � { Threats , Vulnerability,Asset Value}4. What is a hash function, and what can it be used for?5. a. A Banking systems analysts is reported to siphoning a customer’s account. Brieflydiscuss if this is a vulnerability, an exploit or a security incident?b. Based on the Asset Value, briefly discuss the statement: “Computer security should beperiodically reassessed”. You may be guided by the urgency and criticality of theinformation assets.6. Briefly discuss the extent to which insiders or “frenemies” may pose security challengesto the organization.7. What is a cryptographic key, and what is it used for?8. What is an open port? Why is it important to limit the number of open ports a system hasto only those that are absolutely essential?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here