Answer To: PART A Virtualization creates a safe sandbox for you to experiment with the various security tools...
Pranav answered on Jul 02 2021
Resource
ITT-307 Lab Assessment Report Template
Professor: {Enter Professors Name}
Course: {Enter Course Number, Title, and Section}
Student: {Enter Your Name}
Date: {Enter Date}
Title: {Enter Title for this Assignment}
Directions:
Overview: Installation of Linux Kali vie VM ware and All the concept related to Cyber security.
PART A
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.
Choose Custom setting as we can make changes as we want.
Set User ID and Password
Kali Linux Ready to run and all the configurations and device information
PART B
Effective research is critical for success in the Cybersecurity field.
1. Perform a data search of yourself or a family member. Use the PeekYou website located within the required readings or a similar free site.
Output:
2.Become familiar with the current Cyber Security vocabulary utilized by Federal Agencies such as the NSA, CISA, NIST, NCSD, etc.
NSA – National Security Agency of US (United States) department of defense.
CISA-The Cybersecurity and Infrastructure Security Agency
NIST-National Institute of Standards and Technology
NCSD- National Cyber Security Division.
RAW- Research and Analysis Wing
In 500‐7500 words, describe:
1. The findings of your personal data search.
Answer: There are lot of ways to search personal information. If we use google.com to check personal data, it will display all the professional and your social data.
2. The common security threats that affect your digital footprint.
Answer:
· By sending photos and videos of themselves, they are at risk of embarrassment
· Hacker can steal your money by digital footprint.
· By posting picture various crimes are raising in countries
· By using web sites, they will silently put spyware in your laptop to steal your data and personal information.
· Cyber Espionage is type of hacking major institutional data base to collect the personal data.
· Active data trace by registering on different web sites such as your name email phone number and photos.
· Passive data trace is like taking your data without knowing you from your computer and browsing history, location specific data, search keywords and use of smart television.
3. The following terms: cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery. Provide a brief definition.
Cyber Threat: Cyber treat is basically the malicious act which steels your data, seeks to damage your data, disrupt digital social life in general. Cyber-attacks are threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.
In today life information security is most important aspect, Due to that cyber treats trigger cyber bulling and phishing like cyber-crime. many cyber-attacks are simply troubles, some are quite serious, at the same time some are potentially threatening human lives.
Risk analysis: The risk analysis is used by information technology, projects, security issues and any other event where risks may be considered as based on a quantitative and qualitative basis.
· To look forward and reduce the effect of dangerous results occurred from adverse events.
· To plan for technology or equipment...