quiz image

Security Awareness: Protecting Company Data from Compromised Devices

LegendaryDecagon avatar
LegendaryDecagon
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is a potential risk if a user uses the same password for their personal email and corporate account?

Account compromise through brute force or password guessing

What is the primary goal of conducting security awareness training?

To make security threats less serious and painful

Why is authentication and authorization of users and their access rights crucial?

To prevent Credential theft

What is an example of Multi-Factor Authentication (MFA) used in a government service?

<p>ID/Password + One-time password</p> Signup and view all the answers

What is the new perimeter in terms of security, according to the text?

<p>User's identity</p> Signup and view all the answers

What is a main countermeasure to protect data at rest on a user's device?

<p>Data encryption: File level or disk encryption</p> Signup and view all the answers

What is a top cause of costliest data breaches?

<p>Malware (viruses and Trojans)</p> Signup and view all the answers

What is a countermeasure to protect data in transit?

<p>SSL/TLS with valid certificates</p> Signup and view all the answers

What is a threat to data at rest on-premise or in the cloud?

<p>Unauthorized or malicious process</p> Signup and view all the answers

What is a common cause of data breaches due to human error?

<p>Lack of diligence and untrained employees</p> Signup and view all the answers

What is privacy typically associated with?

<p>Secrecy for the benefit of the individual</p> Signup and view all the answers

What is the result of achieving the goals of cybersecurity?

<p>Enhancing the security posture of the organization</p> Signup and view all the answers

What is essential for enhancing overall security posture?

<p>Enhancing detection systems and response processes</p> Signup and view all the answers

What is the primary focus of the term 'privacy'?

<p>Protecting personal information</p> Signup and view all the answers

What is an important aspect of cybersecurity according to Ross Anderson?

<p>Preventing invasions of personal space</p> Signup and view all the answers

What is an example of biometric information used for authentication?

<p>Finger prints</p> Signup and view all the answers

What is the purpose of continuous monitoring in identity and access management?

<p>To continuously verify user identity throughout a session</p> Signup and view all the answers

What is a security consideration for in-house developed apps?

<p>Using a secure framework throughout the software development lifecycle</p> Signup and view all the answers

What is a risk associated with personal apps on BYOD devices?

<p>Users may consume insecure apps</p> Signup and view all the answers

What is a characteristic of Shadow IT systems?

<p>Systems developed by individual departments</p> Signup and view all the answers

What is the primary source of cybersecurity challenges?

<p>Human error</p> Signup and view all the answers

What is the goal of a targeted attack?

<p>To maintain persistent access to a network</p> Signup and view all the answers

What is a common way that cybersecurity attacks begin?

<p>With a phishing email</p> Signup and view all the answers

What is a characteristic of ransomware attacks?

<p>They demand payment in cryptocurrency</p> Signup and view all the answers

Why are security awareness training programs important?

<p>To educate employees on cybersecurity best practices</p> Signup and view all the answers

What is the primary purpose of cybersecurity?

<p>To protect individuals and organizations from unauthorized exploitation of data, network systems and technologies</p> Signup and view all the answers

Why is investing in cybersecurity crucial for successful businesses?

<p>It can help prevent irrevocable damage or bankruptcy</p> Signup and view all the answers

What is an example of a cyberattack?

<p>A phishing email</p> Signup and view all the answers

What is the consequence of a data breach, such as the one experienced by British Airways?

<p>A record £183m (AUD 330m) fine</p> Signup and view all the answers

What is the importance of cybersecurity in today's digital environment?

<p>It is a crucial aspect of protecting individuals and organizations</p> Signup and view all the answers

What can occur if a user uses the same password for their personal and corporate accounts?

<p>A potential security risk</p> Signup and view all the answers

What is the main goal of cybersecurity?

<p>To protect individuals and organizations from cyber threats</p> Signup and view all the answers

What is an example of a malicious activity in the cyberspace?

<p>A phishing attack</p> Signup and view all the answers

Why is cybersecurity a broad area of security?

<p>It encompasses computer security, network security, software/hardware security, and more</p> Signup and view all the answers

What can help reduce the risk of cyberattacks?

<p>Investing in cybersecurity</p> Signup and view all the answers

What is the percentage of the total grade for the quizzes in this subject?

<p>30%</p> Signup and view all the answers

Who is the lecturer for this subject?

<p>Dr Partha Sarathi Roy</p> Signup and view all the answers

What is the format of the assignment for this subject?

<p>Either written reports or programs (or combined)</p> Signup and view all the answers

Where can students access lecture notes and recorded lectures?

<p>From Moodle</p> Signup and view all the answers

What is the ISBN of the recommended textbook for this subject?

<p>978-78847-529-7</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser