1. Why is phishing, and social engineering generally, difficult to address or prevent with technological controls? 2. An internet site starts distributing a program that gets a popular word processor to send a copy of whatever files it produces to be emailed to a specific email address. Is this a vulnerability, an exploit, or a security incident? 3. Briefly explain the Cyber-Risk function below: ���� ≜ � { Threats , Vulnerability,Asset Value} 4. What is a hash function, and what can it be used for?
1. Why is phishing, and social engineering generally, difficult to address or prevent with
technological controls?
2. An internet site starts distributing a program that gets a popular word processor to send a
copy of whatever files it produces to be emailed to a specific email address. Is this a
vulnerability, an exploit, or a security incident?
3. Briefly explain the Cyber-Risk function below:
���� ≜ � { Threats , Vulnerability,Asset Value}
4. What is a hash function, and what can it be used for?
5. a. A Banking systems analysts is reported to siphoning a customer’s account. Briefly
discuss if this is a vulnerability, an exploit or a security incident?
b. Based on the Asset Value, briefly discuss the statement: “
periodically reassessed”. You may be guided by the urgency and criticality of the
information assets.
6. Briefly discuss the extent to which insiders or “frenemies” may pose security challenges
to the organization.
7. What is a cryptographic key, and what is it used for?
8. What is an open port? Why is it important to limit the number of open ports a system has
to only those that are absolutely essential?
Trending now
This is a popular solution!
Step by step
Solved in 4 steps