[go: up one dir, main page]

0% found this document useful (0 votes)
26 views1 page

CIT 4209 Computer Systems Security Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views1 page

CIT 4209 Computer Systems Security Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Technical University of Mombasa

CIT 4209 Computer systems security Study

Guide / Revision Questions Question 1


a) Differentiate between “Risk Assessment” and “Risk Management”
b) Explain four major areas addressed during risk assessment.

c) Describe the major risk handling strategies


d) Explain the following cyber threats
i. Bots and Botnets
ii. Cryptomining
iii. Drive-By Exploit and Watering Hole
iv. Script kiddie
v. Adware
vi. Code injection
vii. Denial of service
viii. Man-in-the-middle
ix. Password cracking
x. Spoofing

Question 2
a) Explain the following terms:
i) Cybersecurity incident
ii) Incident Response”
iii) Hot site facilities:
iv) Cold site facilities
b) Hence describe the six stages of incident response
c) Outline any four Incident Categories as identified by National Institute of Standards and
Technology (NIST)

Question 3
a) i) Explain any five Typical mobile security issues
ii) Explain any five Consequences of a Mobile Attack Can Be Severe
iii) Explain the steps to take to protect your mobile phone
b) i) Explain the term “cloud computing”
ii) Explain five characteristics of cloud computing

TUM is ISO 9001:2015 Certified


1

You might also like