COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Misconfigured access rights Access rights set up what can and cannot be seen when someone logs into a system. If these are not set up correctly in an email server, a person may be able to see someone else’s emails. If a person accesses an account that they do not have permission to see, they might be breaking the law.
Detailed explanation-2: -A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.
Detailed explanation-3: -Misconfigured Access Rights are when user accounts have incorrect permissions. The bigger problem from this could be giving people who are lower down the chain of command access to private information that managers could have. They could wrongly have access to employee records or customer data.
Detailed explanation-4: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.