Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(a) Describe how each Cyber Security framework components work together to address a Cyber Security event. (10 marks) (b) List FIVE (5) types of authentications

(a) Describe how each Cyber Security framework components work together to address a Cyber Security event. (10 marks)

(b) List FIVE (5) types of authentications for a server. (5 marks)

(c) Nowadays, it has become increasingly popular to use Ransomware as a cyber-attack tool.

(i) Ransomware is a special type of malware. Explain TWO (2) ways Ransomware is different compared to other types of malware. (4 marks)

(ii) There are TWO (2) types of mechanisms that Ransomware uses to execute a cyber-attack. List and differentiate BOTH. (4 marks)

(iii) WannaCry is a ransomware attack that spread to 150 countries in 2017. It exploited a particular vulnerability. Describe how this type of vulnerability can be minimized/avoided.

Step by Step Solution

3.35 Rating (158 Votes )

There are 3 Steps involved in it

Step: 1

a Cyber Security Framework Components Working Together Cybersecurity frameworks integrate various components to effectively manage and address cyberse... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Management Leadership questions