Tuesday, August 23, 2016

Cyber Security: Quiz

Question 1
Consider a scenario:

A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.

In the UK, under which of the following laws would the organisation have committed an offence?

  • Computer Misuse Act
  • Data Protection Act
  • RIPA
  • Fraud Act

Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more Discover Data Science with Coursera 

In failing to patch their software against a known vulnerability, the organisation has not taken adequate measures to secure the personal data of customers and therefore failed to meet its obligations under DPA.


Question 2
Thinking about the same scenario:

A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.

In the UK, under which of the following laws would the hacker have committed an offence?

  • Computer Misuse Act
  • Data Protection Act
  • RIPA
  • Fraud Act

By gaining unauthorised access to a computer system the hacker would have committed an offence under this act.


Master Computer Science on Coursera Coursera Project Management - Qualify for 35 PDUs

Question 1
Your bank calls to tell you they have noticed some suspicious activity on your bank account. What type of security attack would you suspect to have happened?

  • Data loss
  • Identity theft
  • Cyberbullying
  • Trolling
It seems likely that your bank account details may have been compromised, so you should take immediate action and speak to your bank. This may have occurred as a result of responding to a phishing email.

Question 2
Which UK law makes it an offence to modify computer material without permission?

Data Protection Act
  • RIPA
  • Computer Misuse Act
  • Fraud Act
Build Project Management Skills with Coursera Learn Data Science, Digital Marketing, Business Foundations & More. Start Learning.

Question 3
What is the specific term used to refer to the security risks posed by employees of an organisation to their employers?

  • Insider threat
  • Cybercrime
  • Hacktivism
  • Corporate espionage
Even though they are memory chips, solid state disks do not need a power source to keep the data stored. Additionally, because they have no moving parts, solid state disks are very robust and are unlikely to be damaged if dropped or exposed to magnetic fields.

Question 5
By making backups of our data, which of the following threats can we protect ourselves from?

  • A hacker gaining access to our data.
  • A hacker trying to sabotage your computer system by deleting or modifying critical data.
  • An eavesdropper making a copy of your data as it is transmitted across the network.
  • Ensure that your software is always updated and free from vulnerabilities

11 comments:

  1. I found Hubwit as a transparent s ite, a social hub which is a conglomerate of Buyers and Sellers who are ready to offer online digital consultancy at decent cost.Penrose Condo

    ReplyDelete
  2. Thanks for sharing such a nice post and great information with us. This information is really helpful for us. I must suggest your readers to Visit Cyber Security Training Course

    ReplyDelete
  3. Nice Post...


    I'm having very interesting information regarding Hire a Hacker US

    ReplyDelete
  4. Cyber Security framework helps you understand the risks that can affect the system brutally, how to customize the effects of risks, the way to respond to them, what other ways should be implemented in order to make your system secure and robust from various attacks.

    ReplyDelete
  5. I got here much interesting stuff. The post is great! Thanks for sharing it! Secure coding tournaments

    ReplyDelete
  6. The cyber security course Framework enables you to comprehend the threats that can wreak havoc on your infrastructure, as well as how to configure the risks' consequences, how to react to them, and what other measures should be taken to make your system safe and resilient against various attacks.

    ReplyDelete
  7. Thank you for sharing such an interesting article and valuable information with us. This data is extremely beneficial to us. I feel compelled to recommend to your readers cyber security

    ReplyDelete