Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cybersecurity Fundamentals: Threats, Defenses, and the Westphalian Model, Exams of Cybercrime, Cybersecurity and Data Privacy

Key cybersecurity concepts, including definitions, asymmetric threats, the westphalian model's role in global cybersecurity, advanced persistent threats (apts), and emerging vulnerabilities like smart grid security. it presents questions and answers to promote understanding of these critical topics, making it a valuable resource for students learning about cybersecurity challenges and solutions. The document's educational value lies in its clear explanations and practical examples, enhancing comprehension of complex cybersecurity issues.

Typology: Exams

2024/2025

Available from 05/10/2025

bonny-kahuro
bonny-kahuro 🇺🇸

233 documents

1 / 16

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1
CYBER SECURITY QUESTIONS AND
ANSWERS (2025)
Topic What is Cyber security?
Revolutionary change often creates a paradigm shift. Given a new paradigm, it would be
beneficial to redraw the cyber security landscape, critically assessing how the problem of
cyber security should be defined.
What exactly is cyber security? Is it a function or task? Is it a strategy? Is it about
crime? Is it about national security?
Cyber security is a combination of processes, technologies as well as controls purposely
planed for data, networks as well as systems protection from cyber-attacks. It involves collecting
policies, tools, equipping personnel, approaches to risk management, assurance, actions as well
as technologies applicable in protecting cyber environment and assets belonging to users as well
the organization. These assets comprise of installed devices for computing, workers,
infrastructure, applications and the entire sent or data stored in the cyberspace. Cyber security is
a task of the cyber security experts to ensure data as well as assets belonging to individuals and
organizations are well secure against any security threats[ITG03].
Cyber security is a strategic matter that must be strategized in order to protect expensive
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download Cybersecurity Fundamentals: Threats, Defenses, and the Westphalian Model and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

CYBER SECURITY QUESTIONS AND

ANSWERS (2025)

Topic – What is Cyber security? Revolutionary change often creates a paradigm shift. Given a new paradigm, it would be beneficial to redraw the cyber security landscape, critically assessing how the problem of cyber security should be defined. What exactly is cyber security? Is it a function or task? Is it a strategy? Is it about crime? Is it about national security? Cyber security is a combination of processes, technologies as well as controls purposely planed for data, networks as well as systems protection from cyber-attacks. It involves collecting policies, tools, equipping personnel, approaches to risk management, assurance, actions as well as technologies applicable in protecting cyber environment and assets belonging to users as well the organization. These assets comprise of installed devices for computing, workers, infrastructure, applications and the entire sent or data stored in the cyberspace. Cyber security is a task of the cyber security experts to ensure data as well as assets belonging to individuals and organizations are well secure against any security threats[ITG03]. Cyber security is a strategic matter that must be strategized in order to protect expensive

digital assets. It requires professional strategies to counter the cyber threat[Sye14]. The strategy includes coming up with designs, building as well as putting defense to sophisticated systems[JMP17]. It is a crime where computer and network are involved. It threatens both personal and national security depending on the level in which it is carried out. References IT Governance. (2003). What is cyber security? Retrieved from itgovernance: https://www.itgovernance.co.uk/what-is-cybersecurity

Among the major effective ways of defending against asymmetric threats is applying inactive alternatives that involves the installation of sensors aimed recording any invasion from an area that is widespread. Employing “just in time” processes instead of methods that seem logistical to help in the counter of threats. For example by placing an intraheater air as well as sealift individual units that have the capability of handling attacks such as missile attacks. Having in place long-range systems that encompasses missiles and other artillery in defending the system. This can give a nation an opportunity to defend themselves from a far distance which increases flexibility. Research should be done on entities encompassing weapons that are controlled by technology so as to enable in formulating crucial decisions and reacting with knowledge to any threats thus aiding in controlling them[ash99]. References perry, a. b. (1999). Countering Asymmetric Threats. Retrieved from BelfeCente: www.belfercenter.org/sites/default/files/legacy/files/kte_ch5.pdf Rubin, M. (2017, May 31). Asymmetrical Threat Concept and its Reflections on International Security. Retrieved from Middle East Forum: http://www.meforum.org/1696/asymmetrical-threat-concept- and-its-reflections TRIPWIRE GUEST AUTHORS. (2015, August 23). Asymmetric Network Defense: It’s 1904 All Over Again. Retrieved from tripwire: https://www.tripwire.com/state-of-security/security-data- protection/cyber-security/asymmetric-network-defense-its- 1904 - all-over-again/ Topic - Westphalian Model Advantages at Global Level

Not only must asymmetric advantages be countered domestically, attackers often originate from outside the United States. Given that situation, describe how the Westphalian model would aid cybersecurity at the global level. Westphalian model is a community of states which are founded on the disciple of the sovereignty of their territories. This is made of agreed treaties of 1648 when agreements on the peace of Westphalia were made. The treaties entails legal equality as well as autonomy and independence of individual states without external interference. This was to address the war that had lasted for thirty years. This model is of great significance in aiding global security. This is because states are protected by being accorded their sovereignty and no state should interfere with the activities of the other state. With these regulating treaties states have the mandate to act upon any cybersecurity issue especially when the attackers are from outside the United States. The victims of cybercrime face full force of the treaties since the Westphalian Model protects these states. This greatly helps in aiding cybersecurity globally[CAM14]. References MULCAIRE, C. (2014, February 3). How ‘Westphalian’ is the Westphalian Model? Retrieved from E- INTERNATIONAL RELATIONS STUDENTS: http://www.e-ir.info/2014/02/03/how- westphalian-is-the-westphalian-model/ Topic – Advanced Persistent Threats

difficulties in detecting. The separation model acts very well in reducing hoe effective convert channels are[Dan15]. References Edwards, D. (2015, November 30). What are Advanced Persistent Threats (APTs)? Retrieved from PHOENXTS: https://phoenixts.com/blog/what-are-advanced-persistent-threats-apts/ Topic – Emerging Cybersecurity Vulnerabilities Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area. Smart grids have been at a high risk of attack. This has seen to it that the Energy sector has full team devoted to the smart grids security. These attacks are not only many but also both complex and easy naturally. Up to 2015 the power grid threat was theoretical. Today it’s a reality that cyber-attacks can access the power grid management networks, putting power off to several people. This case was experienced in Ukraine in the year 2015 as well as 2016. Experts say that this could take place in the U.S as well. According to Bloomberg news, experts say that the energy sector faces great danger from cyber-attacks, since they are very often and complex though grid operators are alert[DAN17]. To counter the risk of smart grid the following policies are very crucial; using sensors and sensing systems in order to realize any attack early enough and bar them, coming up with and utilizing better tools of investigation to familiarize with the attacks once attacked so as to shift defense in the right manner[GUI11].

References BARTELS, G. (2011, March 15). Combating Smart Grid Vulnerabilities. Retrieved from IAGS: http://ensec.org/index.php?option=com_content&view=article&id=284:combating-smart-grid- vulnerabilities&catid=114:content0211&Itemid= LOHRMANN, D. (2017, February 26). How Secure Is Our Smart Grid? Retrieved from govtech: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/how-secure-is-our-smart-grid.html Topic– Mitigating Global Cybersecurity Attacks on the Enterprise The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level? Due to the increase in the cybersecurity threats, nations all over the globe are teaming up to come up with policies to curb these threats. The attackers are highly developed technically in the way they avoid being detected. Instead of aiming at systems with heavy malware and connections which are hardcoded they seek to tamper with legitimate processes as well as protocols so as to escape with information and attain their aims without being discovered. Recently, an international policy. Tallinn Manual 2.0, is in operation which recognizes cyberspace to be part of international law. As per the NATO Cooperative Cyber Defense Centre of Excellence, the law infers on international law which ranges independence and responsibilities of a state as far as human right are concerned as well as law of space[NAT17]. The Cybersecurity

The key steps are; Definition and classification of networks or system resources. Giving resources relative value of significance. Detecting what might pose threat to the resources. Coming up with a strategy to tackle a problem that seems to pose serious threats. Definition and interpretation of methods to lower the results of any attack that may occur[Mar06]. Vulnerability analysis aims at categorizing major assets and come up with processes of risk management. These assessments should take place continually maybe quarterly or annually putting the cost of the process into consideration. This is to keep the system in check and as well as offering the necessary knowledge applicable during crisis. Cyber-attacks happen always they have no break so vulnerability assessment too should be a continuous process[Tra16]. References Carabott, E. (2011, May 31). Why You Need to Run a Vulnerability Assessment. Retrieved from TechTalk.Gfi: https://techtalk.gfi.com/vulnerability-assessment/ Rouse, M. (2006, March). vulnerability analysis (vulnerability assessment). Retrieved from SearchMidmarketSecurity: http://searchmidmarketsecurity.techtarget.com/definition/vulnerability-analysis Siclair, T. (2016, October 10). How often should you perform enterprise vulnerability assessments? Retrieved from Community: https://community.hpe.com/t5/Infrastructure-Insights/How-often- should-you-perform-enterprise-vulnerability/ba-p/6906286#.WnHt8KinHIV

Topic– Management Actions Prior to Cyber Attack After a cyber-attack, the organizational decision making and response to the attack is critical to getting the organization through the incident and back to normal business after the attack. Please review and discuss the actions management should take prior to a cyber-attack. Include in your discussion an overview of crisis management and the role it plays in recovery. The safety of those employed should be given a high priority. Before a cyber-attack, a firm should have in place methods that will see to it that the management will be in a position to handle crisis in an effective manner. Before the attack take place, an organization should put in place a staff to deal with crisis at their occurrence and outline the procedures to be followed by the staff in approaching the crisis. The team dealing with crisis management will direct all activities and work together with departments which are dependent especially emergency communications department. This will enable the organization to overcome the crisis faster and move as usual. Crisis management is being able to make it through a certain case or danger depending on the past plans developed in the continuity of business, ability to recover and the crisis management team put in place before crisis. The establishment of a crisis management team enables the organization to recover it loss in a very short period of time since the team will start working immediately because they know their roles hence aiding in the recovery process[Cha16]. References Charles A. Sennewald, C. B. (2016). Crisis Management. Retrieved from ScienceDirect: https://www.sciencedirect.com/topics/medicine-and-dentistry/crisis-management

only to realize when crisis arise. The plan should be tested every year so as to detect if there are changes in the IT, the structure of operation as well as priorities in the business. Crisis communication. During crisis the reaction of people whether panic or smooth response to emergency ids determined by how effective communications are. A toolkit that has all communication platforms should be designed and placed in a strategic place. Communication channels may include email, intranet as well as the company’s website. A sample of emergency message should be drafted in advance for faster consistent communication even through press release or social media. Employee safety. Having a staff that is kept safe is very important on an organization. Employees can receive training from local agencies in order to know the most appropriate way of handling crisis[Cit18]. References Citrix Community. (2018). 7 Key Elements of Business Continuity. Retrieved from Citrix: https://www.citrix.com/articles/7-key-elements-of-business-continuity.html McFarland, C. (2014, September 25). 10 key components of a business continuity plan. Retrieved from CloudDirect: https://www.clouddirect.net/resources/10-key-components-of-a-business- continuity-plan/ Topic - Offensive Cyber Attack Technology In traditional warfare, attacking communications and command and control functions are integral to victory. Attacking the systems that are the conduit of those critical functions are equally integral to victory. Discuss three offensive cyber-attack technologies and when they should be deployed.

The emphases by the cybersecurity are normally based on avoiding cyber-attacks before they take place having predicted how some technologies can be used against as certain system at various levels of security. Several reported cyber threats have resulted to organizations being keen on the security of their systems. Difficulties forwarded to the analyst dealing cyber-security as far as privacy and security is concerned are; Compromised data, intellectual property loss, cloud networks and vulnerabilities in association with the internet[RKu13]. To protect these attacks a firm stand on defense is in great need. So as to uphold a posture that is offensive it would call for the application of the following attacks; a) Distributed denial of service attack. This is applied in influencing how accessible and integral the aimed network or system is. This is achieved through use of bandwidth of network through a computer that is remote controlled. This cause flooding of the victims system with congestion while in several instances escaping unnoticed by utilizing all resources he can access. As per now, total control of the system that is targeted, is very possible. b) Remote Key loggers; this resembles the Remote Administration Tool. At the moment of installation of this tool on the aimed computer, it translates to logging of every keystroke. c) Trojans; this resembles a malicious software embedded in original programs as usual and it is made to cause disorder in the whole system. Trojans work with great effectiveness if well launched[Sto16]. References R. Kumudha, A. A. (2013). Technology and Trend Point of View Cyber Security. Retrieved from CiiT: https://www.ciitresearch.org/dl/index.php/fs/article/view/FS StopSpam.org. (2016, January 8). Hacking Prevention – DDoS Attack and R.A.T’s. Retrieved from Stopspam.org: http://www.stopspam.org/hacking-prevention-ddos-attack-and- disabling-antivirus/

References Trulioo. (2015, June 9). Should the Private Sector Collaborate with Government to Strengthen Cybersecurity? Retrieved from Trulioo: https://www.trulioo.com/blog/should-the-private-sector- collaborate-with-government-to-strengthen-cybersecurity/ U.S. Government Accountability Office. (2017, February 14). CYBERSECURITY: Actions Needed to Strengthen U.S. Capabilities. Retrieved from GAO: https://www.gao.gov/products/GAO- 17 - 440T