Question: Question 1 a)The CIA Triangle (Confidentiality, Integrity, Availability) is a fundamental model in information security that defines three core principles to ensure the protection of

Question 1 a)The CIA Triangle (Confidentiality, Integrity, Availability) is a fundamental model in information security that defines three core principles to ensure the protection of information and data. Describe the CIA Triangle with examples.

b)What is the main goal of a firewall in a network security setup?

c)Explain the concept of "phishing" and provide strategies to prevent falling victim to phishing attacks.

Question 2

a)Describe the difference between symmetric and asymmetric encryption algorithms, providing examples of each.

b)Explain why is cyber security one of the most important aspects to be focused on?

Question 3

a)Explain the components of an encryption scheme?

b)What is the problem of symmetric key cryptography?

Question 4

a)Small companies typically do not have sufficient, or any, security budgets and spend little to defend from security threats. Therefore, hackers testing their abilities and it is much safer and lower risk for them to practice on a small companies that most likely has minimum defenses and technical ability. Assume that you are Cyber Security Manager. What are your suggestions for small companies to Secure their system?

b)You are as a cyber security expert has been hired by an organization whose networks have been compromised by a malware attack. After analysing the network system, you submit a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files. Which malware attack is you are reporting?

Question 5

a)Explain the main steps involved in the digital forensics process, highlighting the significance of each step.

b)Risk Management is a methodology that helps managers to identify, analysis, treating and monitoring the risks involved in any activity or process. Explain the major steps of the risk control strategies.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!