Technical Aspects of Cyber-Security-HOME ASSIGNMENT

Question
WORDS COUNTREFERENCE
750APA

QUESTIONS:

1.Describe briefly the functionality provided by the information system?
2.Define the main 3 information assets managed by the information system?
3.Explain the motivation of an attacker to cause a damage?
4.what he will gain from performing an attack that will damage the security
property of the asset?
5.what the attacker’s motivation was?
6.what security property of the information asset was damaged?
7.what damage was caused to the organization?
8.what damage was caused to the users?
9.Describe the impact/damage to you if the security property is damaged?
10.Describe the damage to the vendor/provider in such scenario?

in progress 0
1 Answer 456 views 0

Answer ( 1 )

  1. In current time the fastest development is on the internet which we are using on regular basis. Due to an increase in cyber attacks in a few years they become a serious problem in the digital world. Facebook, Google suite and IDC information systems have different areas of application like digital marketing, branding, and social e-commerce. Here the main security concern and issues are malware, misuse of identity, threats of third party applications, and phishing attacks in social media.

Leave an answer

False