final assesment. Lk Crystal-wellcome Memorial Sec. ART 101
Cyber security
Final assessment.
Question 1: Explain 5 areas which could be considered risks. Keep in mind these are not all
technical risks. Use external resource to support your answers.
According to [ CITATION Abi20 \l 1033 ], “risk is the probability of exposure or loss resulting
from a cyber-attack or data breach on your o
...[Show More]
final assesment. Lk Crystal-wellcome Memorial Sec. ART 101
Cyber security
Final assessment.
Question 1: Explain 5 areas which could be considered risks. Keep in mind these are not all
technical risks. Use external resource to support your answers.
According to [ CITATION Abi20 \l 1033 ], “risk is the probability of exposure or loss resulting
from a cyber-attack or data breach on your organization.” Normally, attacks in technology which
cause risks are considered in five areas which are what, when, why, how, and why. For more
understanding, lets describe these areas below.
What: these are thing that we use, and which can cause loos of the loss of data. For
example, many of us like to use torrents while downloading files, but these torrents can
lead to risks of losing some of your files, or corrupt your whole computer system. Also,
using outdated software can also be a source of a risk since this software can create
viruses on your computer which may lead to loss of data.
Where: this can be referred to as areas or internet connections that we connect on which
can be sources of risks to our computer system. For example, we sometimes connect our
computers to untrusted Wi-Fi. So, this can be a source of risk because we don’t know
what the owner of that Wi-Fi wants to do with your system.
How: this can be referred to ways in which risks comes to our systems. For example, if
one has knowledge and skills on how to protect his system, risks are likely to be less, but
on the other hand, if one doesn’t know how to protect his files, the chances of having
risks on his systems are high. For instance, an ignorant person may be happy to use
untrusted network because it is free, but after all, he is also creating good chances of
getting his system into risks because we never know the owner of that network may be
trying to stealing information to whoever connects to that network.
When: this can be referred to as a time when one has chances of getting risks. For
example, when you are commenting on a certain post on internet, they are some people
who are trying to just harm your security. Furthermore, when you are using ecommerce,
and you give out your personal information such as your MasterCard information, some
people are likely to use this information that you provide while stealing from you.
Why: this can be referred to as reasons why people chose to put themselves in a position
where chances of risks are high. For example, many people like to download movies
through torrents because it is easier and faster, however they are so many chances of
getting risks.
[Show Less]