COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Weak Passwords, misconfigured access rights, removable media, unpatched or outdated software, social engineering techniques and malicious code are All cyber security threats to businesses and organisations?
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Misconfigured access rights Access rights set up what can and cannot be seen when someone logs into a system. If these are not set up correctly in an email server, a person may be able to see someone else’s emails. If a person accesses an account that they do not have permission to see, they might be breaking the law.

Detailed explanation-2: -A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.

Detailed explanation-3: -Misconfigured Access Rights are when user accounts have incorrect permissions. The bigger problem from this could be giving people who are lower down the chain of command access to private information that managers could have. They could wrongly have access to employee records or customer data.

Detailed explanation-4: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

There is 1 question to complete.