0% found this document useful (0 votes)
63 views5 pages

Tutorial 1

The document contains questions about cybersecurity concepts. It distinguishes between vulnerability, threat, and control. It defines data integrity as ensuring information can only change in authorized ways, while system integrity ensures a system performs as intended. It differentiates threats from attacks, giving hacking as an example of a threat and bringing in a virus as an attack. It describes passive threats like eavesdropping versus active threats like data modification. It lists categories of passive and active network attacks like traffic analysis and denial of service, explaining them with diagrams. It discusses confidentiality, integrity, and availability requirements for an online banking system. It defines network and software attack surfaces. It distinguishes between computer and internet security, giving information security as a computer

Uploaded by

Heng Phin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views5 pages

Tutorial 1

The document contains questions about cybersecurity concepts. It distinguishes between vulnerability, threat, and control. It defines data integrity as ensuring information can only change in authorized ways, while system integrity ensures a system performs as intended. It differentiates threats from attacks, giving hacking as an example of a threat and bringing in a virus as an attack. It describes passive threats like eavesdropping versus active threats like data modification. It lists categories of passive and active network attacks like traffic analysis and denial of service, explaining them with diagrams. It discusses confidentiality, integrity, and availability requirements for an online banking system. It defines network and software attack surfaces. It distinguishes between computer and internet security, giving information security as a computer

Uploaded by

Heng Phin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Tutorial 1

Question 1
1. Distinguish between vulnerability, threat and control.

Vulnerability is a weakness in the security system.

Threat is a set of circumstances that has the potential to cause loss or harm.

Control is an action, device, procedure or technique that removes or reduces a vulnerability.

Question 2
What is the difference between data integrity and system integrity?
Data Integrity usually ensures that the information can be changed only in an authorized and
specified manner.
System Integrity: Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system.

Question 3
What is the difference between the term threat and attack? Give one example for each term.

Threat Attack

Capable of exploiting vulnerabilities Passive or active attempt that can affect


the system resources

Represent potential security harm to an Insider and outsider attack


asset

For example, the hacker hacks into the For example, the hacker hack into the
company to steal their information then it company system and bring in some virus
will bring a negative impact to the to cause the system to break down.
company.
Question 4
What is the difference between passive and active security threats?

Passive Active

It deals with eavesdropping on It include the modification of transmitted

monitoring, transmissions. data and attempts to gain unauthorized

Electronic mails, file transfer is example of access to computer system


transmissions that can be monitored

Threat of unauthorized disclosure of


Threat of unauthorized change to the state
information without changing the state of
of the system
system

Question 5
List and briefly define categories of passive and active network security attacks. Use
diagrams to explain your answer.

Passive Attack
Release of Message Contents - When the messages are exchanged neither the sender nor the
receiver is aware that a third party may capture the messages.
Traffic Analysis - access the same network as you to listen (and capture) all your network traffic.
Active Attack
Replay - Involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.
Masquerade - Takes place when one entity pretends to be a different entity. Usually includes
one of the other forms of active attack.
Modification of Messages - Some portion of a legitimate message is altered, or messages are
delayed or reordered to produce an unauthorized effect.
Denial of Service - Prevents or inhibits the normal use or management of communications
facilities.
Question 6
Consider an online internet banking system in which users provide a password and account
number for account access. Give examples of confidentiality, integrity and availability
requirements associated with the system and in each case, indicate the degree of importance of
the requirement.

Confidentiality only allows and authorizes the online banking user to login to the account with a
unique username, password, and secure key(for example, login phase).
Integrity is avoiding the payment record to be modified by anyone who accesses the banking
website to make sure the record is true and accurate.
Availability allows the banking website to be visited by authorized users who have an account
when they are needed.

Question 7
Network Attack Surface: Vulnerabilities over enterprise network, wide-area network, or the Internet.
Software Attack Surface: Vulnerabilities in application, utility or operating system code.

Question 8
Briefly distinguish the differences between computer security and Internet security.
Support each explanation with ONE (1) example.

i) computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system. Example : information security,application security, computer security,
network security and cyber security.

ii)Internet security consists of a range of security tactics for protecting activities and transactions
conducted online over the internet such as hacking into computer systems, email addresses, or
websites.

In your opinion, why is it so important to understand these 2 terms in the question


above? Provide TWO (2) reasons to support your answer.
(ii) - to protect computer systems and information from harm, theft, and unauthorized use.
- Internet security means protection of hardware,software, and the most important data from
the weaknesses of various systems on the internet. Especially the entry of bank account/credit
card details must be carefully handled.

May help to understand what and which appropriate security approaches to be applied correctly.
To ensure our data is safe and secure both on the computer and Internet.

Question 9
Agree, inside attack is more dangerous as insiders already have the knowledge of what's
important within a network and where it's located, something that external attackers
don't usually know from the start

Question 10
Authenticity is to confirm that users are who they say they are.
Exp: enter username and password when login.
Authorization is giving those users permission to access resources.
Exp: admin gives appropriate access to users.

You might also like