Professional Documents
Culture Documents
Internet Governance:
Cyber Threats:
9. Define cyber warfare and explain how it differs from traditional warfare.
Cyber warfare involves the use of digital attacks by one nation-state or
organization to disrupt the vital computer systems of another, with the aim of
causing damage, death, and destruction. Unlike traditional warfare, cyber
warfare relies on computer code and can be conducted remotely without
direct physical confrontation.
10. Describe the types of cybercriminals and their motivations in committing
cybercrimes.
Cybercriminals include individuals or groups who commit crimes for financial
gain. They may engage in activities like ransomware attacks, phishing scams,
or intellectual property theft. Motivations for cybercrimes vary but often
involve monetary profit or personal gain.
11. What is cyber terrorism, and how does it differ from other forms of cyber
threats? Provide examples.
Cyber terrorism involves unlawful attacks or threats of attacks against
computers, networks, and information systems to intimidate or coerce
governments or people for political or social objectives. Examples include
hacking into critical infrastructure systems or launching denial-of-service
attacks to disrupt services.
12. Explain the concept of cyber espionage and discuss its implications for
national security.
Cyber espionage involves obtaining secrets and information without
permission from individuals, organizations, or governments for personal,
economic, political, or military advantage. It poses significant threats to
national security by compromising sensitive information and undermining
trust between nations.
Security Policies:
13. Define security policies and explain why they are considered "living
documents" in organizations.
Security policies are formal rules issued by organizations to ensure compliance
with security measures for technology and information assets. They are
considered living documents because they require regular updates to adapt to
changing technology and employee requirements.
14. Discuss the importance of virus and spyware protection policy in
maintaining cyber security.
Virus and spyware protection policies help detect and mitigate threats in files
and applications by using signatures and behavioral analysis. They are
essential for preventing malware infections and protecting sensitive
information from unauthorized access.
15. Describe the role of firewall policy in preventing unauthorized access to
systems and networks.
Firewall policies define rules for controlling incoming and outgoing network
traffic, blocking unauthorized access and potentially malicious activities. They
serve as a barrier between internal and external networks, helping to protect
systems and data from cyber threats.
Threat Actors:
19. Define threat actors and discuss the different types of threat actors
based on their motivations and tactics.
Threat actors are individuals or groups that intentionally cause harm to digital
devices or systems. Types of threat actors include cybercriminals, nation-state
actors, hacktivists, thrill seekers, insider threats, and cyberterrorists, each with
distinct motivations and tactics.
20. Explain the significance of understanding different types of threat actors
for individual and organizational cybersecurity.
Understanding different types of threat actors helps organizations identify
potential threats, assess risks, and implement appropriate security measures
to protect against cyberattacks.
21. Discuss the common targets of threat actors and why they are targeted.
Threat actors often target large organizations, small and medium-sized
businesses (SMBs), and individuals for financial gain, access to sensitive
information, or to disrupt operations. Weak security systems and valuable data
make these targets attractive to attackers.