ICTCYS407 Gather Analyse and Interpret Threat Data Syatem

ICTCYS407 Gather Analyse and Interpret Threat Data Syatem

Questions:

Question 1: Fill in the blanks by using the options provided in the given table:
Cybersecurity threat  is a vulnerability to any _______ attack by a person or organisation to obtain access to another individual or organisation’s network to corrupt data or to steal sensitive information. In certain cases, attacks damage computer systems.
No company is _______ to cyber threats unless they have a proper _______ in place. But before _______ and mitigating cyber threats it is important to identify these _______. Below are some commonly known cyber security threats in the IT industry.
Question 2: True or false
A)Trojan: A malicious software aimed at infecting the networks of a corporation, losing data, and bringing the network to a standstill. The virus binds itself to a program, file, or document and is inactive until some event triggers the system to execute its code.
B)Virus: A type of malicious software (malware) or code that functions as a legitimate program or file that tricks a user into loading and running malware on their computer.
Question 3: What are commonly known cyber security threats?
Question 4: Fill in the blanks by using the options provided in the given table:
Email _______ is a most _______ way of attacking individual users or an organisation. Since the phishing attempts are growing in numbers of staff need to be careful when _______ and _______ online _______ from unknows _______ or opening email attachments. The most important thing is to no to respond to these emails. If the staff respond to those emails, that will validate the recipient email address which will lead to continued attacks in the future.
Question 5: Fill in the blanks by using the options provided in the given table:
Cyber security, threat _______ information and _______ are provided in the form of data, both internal and external to the enterprise. Data obtained on IOC networks is likely to be _______ and can breach the _______ protection _______ of the enterprise, leading to a break-up of _______ data. When a company gathers regular and real-time intelligence data from both internal and external processing components, it can cross-check between insider intelligence accumulators and rapidly create action plans to meet all levels of requirements.
Question 6: What are sources of threat data?
Question 7: Fill in the blanks by using the options provided in the given tableThe _______ of the cyber threat _______ indicates what will be included and omitted from the analysis. Objects included are those items that should be protected from attacks. The first step of any cyber threat analysis should be to find any _______ object that may be protected from access by _______ third parties. Eventually, the degree of _______ and the desired level of _______ of the object are finalised and extensively defined by the drafters of the analysis.
Question 8: Ways of collecting threat data.?
Question 9:  Procedures when creating a cyber security policy?
Question 10: Multiple choice question
Benefits of having policies in the workplace
Question 11: True or false
A)There are 3 main types of data sources.
B)Machine data sources have user-defined names, must exist on a computer that is ingesting data, and cannot be easily shared.
Question 12: What are commonly known data sources in IT world?
Question 13: What are types of network security devices?
Question 14: Fill in the blanks by using the options provided in the given table           
The _______ device is one of the _______ defence lines in the _______ because it _______ one network from the other. Firewall can be an _______ system or can be included in other infrastructure devices, such as routers or servers. You can find a hardware and software firewall solution; Some firewalls are available as _______ that functions as the main device that separates two networks.
Firewall does not include unwanted and unwanted network traffic entering the organisation system. Depending on the _______ of the organisation firewall, the firewall can completely _______ some traffic or all traffic or can verify some or all traffic.
Question 15: What are types of firewall policies that are commonly used?
Question 16: Fill in the blanks by using the options provided in the given table
For the purposes of application _______, data _______ records _______ about the maintenance of the infrastructure required for an application to be executed. This could be many types of _______, such as a user-based actions on a computer or software system, traffic to and from a _______ or actions undertaken on a complete computer _______. There are many possibilities for what can be _______, and all this information can be useful to system _______ because they work to improve the operation of their specific systems.
Question 17: Fill in the blanks by using the options provided in the given table
Knowing the IP _______ of visitors to a server can help identify _______ or ongoing attacks. Many times, an _______ of traffic from a particular IP range within a short period of time could _______ that there is an attack attempt of some kind (such as quickly loading pages with several injections to try to obtain _______ information). If that range of addresses can be _______ effectively, you can _______ the attack from succeeding, which could save a company a lot of time and money that deals with the _______ of such attack.
Question 18: What are log analysis tools?
Question 19: What is an alert?
Question 20: What is a log file??
Question 21: What practices to follow when creating a data set?
Question 22: What is false positive? How to identify false positive?
Question 23:  What are 4 steps for reviewing threats?
Question 24: What are steps that need to be taken when writing a report?

Read less
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER
error: Content is protected !!