BUSINESS ADMINISTRATION
MANAGEMENT INFORMATION SYSTEM
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
by hackivists
|
|
by hackers
|
|
on critical infrastructure
|
|
on industrial control systems
|
Detailed explanation-1: -They include primary actors such as nation states, criminal gangs, cyber-terrorists and even disgruntled insiders. Other typical threats include: data breaches, ransomware attacks, supply chain attacks and natural disasters.
Detailed explanation-2: -As a result, malicious cyber attackers target government systems to steal information, disrupt and deny access to information, degrade or destroy critical information systems, or operate a persistent presence capable of tracking information or conducting a future attack.
Detailed explanation-3: -However, IoT devices in critical infrastructure networks, if not properly secured, increase the risk of unauthorized access to operational assets and networks. Improper configurations such as default credentials and unpatched vulnerabilities are often abused by threat actors to gain network or device access.
Detailed explanation-4: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.