COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A plan that describes threats, protection measures (actions), reasons for the measures, constraints, legal responsibilities, usability, cost/benefit and a test plan.
A
Cyber security plan
B
Anti-malware software
C
Risk assessment
D
Security requirements
Explanation: 

Detailed explanation-1: -It is a written document in an organization outlining how to protect the organization from cybersecurity threats, and how to handle incidents and events when they do occur.

Detailed explanation-2: -Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information.

Detailed explanation-3: -Physical Sabotage is taking deliberate actions aimed at harming an organization’s physical infrastructure (e.g., facilities or equipment). Virtual Sabotage is taking malicious actions through technical means to disrupt or stop an organization’s normal business operations.

Detailed explanation-4: -Use strong passwords. Strong passwords are vital to good online security. Control access to data and systems. Put up a firewall. Use security software. Update programs and systems regularly. Monitor for intrusion. Raise awareness.

There is 1 question to complete.