Академический Документы
Профессиональный Документы
Культура Документы
1. How can you say that Unauthorized Access is happening or has occurred?
Unauthorized access refers to users who gain access to the data of an organization,
network, application or device without permission. Unauthorized access can occur if a
user attempts to access an area of a system they should not be accessing. And it is
closely related to authentication. Authentication is a process that verifies a user’s
identity when they access a system.
2. For you, as student taking and learning the subject (ITE-02), what do you need to put in place
to protect the network?
I’ll make sure that my network or system is secured. I’ll place firewall, install antivirus
and other security programs which can help to detect if a hacker has slipped something
on my system that will compromise it from the inside.
3. Enumerate the eight threat actors and select 3 to defined or explain.
Hostile nation-states – Aggressively target and gain ongoing access to public and private
sector network to compromise, steal, alter or destroy information.
Terrorist groups – Their limited offensive cyber activity is usually disruptive or harassing
in nature. Terrorist organizations or groups mainly use the internet for communication
and recruitment.
Hacktivists - The hacktivist is politically, socially or ideologically motivated and targeted
victims for publicity or to bring about change, which may result in high-profile
operations.
Corporate spies and organized crime organizations
Disgruntled insiders
Hackers
Natural disasters
Accidental actions of authorized users