NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data loss or manipulation
|
|
Disruption of service
|
|
Identity theft
|
|
Information theft
|
Detailed explanation-1: -What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person? Using identity information to impersonate someone to obtain credit is an example of identity theft.
Detailed explanation-2: -An insider threat is a malicious activity against an organization that comes from users with legitimate access to an organization’s network, applications or databases.
Detailed explanation-3: -A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, network, services or other information technology (IT) resources.
Detailed explanation-4: -There are a number of threat actors including: cyber criminals, nation-state actors, ideologues, thrill seekers/trolls, insiders, and competitors. These threat actors all have distinct motivations, techniques, targets, and uses of stolen data. See Advanced persistent threats for a list of identified threat actors.