6.8: Study Questions
- Page ID
- 10024
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)
Study Questions
- Briefly define the three components of the information security triad
- Explain what authentication means
- Give two examples of a complex password
- Give three examples of threat actors
- Name two motivations of hacktivists to commit cybercrime
- List five ways to defend against cyber attacks
- List three examples of PII
- Briefly explain the role of SOC
- Explain the purpose of security policies
- Explain how information availability related to a successful organization
Exercises
- Research and analyze cybersecurity incidents to come up with scenarios of how organizations can prevent an attack.
- Discuss some IoT (Internet of Things) application vulnerabilities with non-techie and techie technology users, then compare and contrast their different perspectives and reactions to IoT vulnerabilities.
- Describe one multi-factor authentication method that you have experienced and discuss the pros and cons of using multi-factor authentication.
- Identify the password policy at your place of employment or study. Assess if it is a good policy or not. Explain.
- Take inventory of possible security threats that your home devices may be exposed to. List them and discuss their potential effects and what you plan to do about them.
- Recall when you last back up your data. Discuss the method you use. Define a backup policy for your home devices.
- Research the career of a SOC professional. Report what certificate training it requires to become SOC professionals, what the demand is for this career, and their salary range.