Questions and Answers
What is the core duty of cybersecurity?
Identify, mitigate, and manage cyberrisk to digital assets
Why is it important to understand risk in the context of cybersecurity?
To determine, measure, and reduce risk effectively
What is Compliance-based security also known as?
Standards-based security
What is a common issue with Compliance-based security?
Signup and view all the answers
What does Risk-based security rely on?
Signup and view all the answers
Why does Risk-based security go beyond an entity's risk tolerance and business needs?
Signup and view all the answers
What is the definition of risk according to ISO/IEC?
Signup and view all the answers
Which of the following is considered as a threat?
Signup and view all the answers
What is the definition of an asset in cybersecurity?
Signup and view all the answers
Which term describes a weakness that could expose a system to adverse threats?
Signup and view all the answers
What is residual risk?
Signup and view all the answers
According to Pfleeger 2015, what are threats?
Signup and view all the answers
What are some criteria based upon which different industries and professions adopt cybersecurity risk tactics?
Signup and view all the answers
According to the University of Maryland research report, how frequently does a hacker attack occur on a computer connected to the Internet?
Signup and view all the answers
What is the average number of malicious attacks sustained by a computer connected to the Internet daily?
Signup and view all the answers
What is a common characteristic of cyberattacks according to the provided text?
Signup and view all the answers
What is the goal of developing new cyberattack methods according to the text?
Signup and view all the answers
Why do hackers continually strive to exploit vulnerabilities in computers and networks?
Signup and view all the answers