COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
A
Data loss or manipulation
B
Disruption of service
C
Identity theft
D
Information theft
Explanation: 

Detailed explanation-1: -What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person? Using identity information to impersonate someone to obtain credit is an example of identity theft.

Detailed explanation-2: -An insider threat is a malicious activity against an organization that comes from users with legitimate access to an organization’s network, applications or databases.

Detailed explanation-3: -A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, network, services or other information technology (IT) resources.

Detailed explanation-4: -There are a number of threat actors including: cyber criminals, nation-state actors, ideologues, thrill seekers/trolls, insiders, and competitors. These threat actors all have distinct motivations, techniques, targets, and uses of stolen data. See Advanced persistent threats for a list of identified threat actors.

There is 1 question to complete.