BACHELOR OF BUSINESS ADMINISTRATION

BUSINESS ADMINISTRATION

MANAGEMENT INFORMATION SYSTEM

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Attacks ____ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.
A
by hackivists
B
by hackers
C
on critical infrastructure
D
on industrial control systems
Explanation: 

Detailed explanation-1: -They include primary actors such as nation states, criminal gangs, cyber-terrorists and even disgruntled insiders. Other typical threats include: data breaches, ransomware attacks, supply chain attacks and natural disasters.

Detailed explanation-2: -As a result, malicious cyber attackers target government systems to steal information, disrupt and deny access to information, degrade or destroy critical information systems, or operate a persistent presence capable of tracking information or conducting a future attack.

Detailed explanation-3: -However, IoT devices in critical infrastructure networks, if not properly secured, increase the risk of unauthorized access to operational assets and networks. Improper configurations such as default credentials and unpatched vulnerabilities are often abused by threat actors to gain network or device access.

Detailed explanation-4: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

There is 1 question to complete.