logo

Cyber Security Communications

   

Added on  2022-08-25

4 Pages636 Words31 Views
 | 
 | 
 | 
Running head: CYBER SECURITY COMMUNICATIONS
CYBER SECURITY COMMUNICATIONS
Enter name of the Student:
Enter name of the University:
Author note:
Cyber Security Communications_1

CYBER SECURITY COMMUNICATIONS1
Question 1:
The hackers are mainly engaged to develop the bad technology. The bad technology is
the system interlopers are using to attack the systems and these type of technologies are
developed in cycle (Kizza 2015). So hacker technology is prosperous. But there are many
ways to mitigate this talent of the hackers being used for the criminal purposes. To become a
hacker, intelligence, enthusiasm, perseverance and determination are required. This talent can
be used for developing the useful technologies (Xu, Hu and Zhang 2013). If the hackers are
used their talent of hacking other systems, then they can prevent many unethical works which
cause the daily life of the user or the system. There are many types of attack by which it can
be possible which are as follows:
i) Litiyersoiiation- It is a process of stealing the access rights of authorized users. By this if
any person store any information which is dangerous for the government or the public, the
hackers can steal the access of the user and destroy the information.
ii) Exploits- By this process, hackers can easily destroy any type of harmful software or
operating systems.
There are many other process by which hackers can use their talent for good reason
and not used for criminal purposes.
Question 2:
System vulnerabilities are the weakness in hardware or software on any server or the
client which can exploit by the determined intruder to achieve the access to any network or
shut down the network.
There are many ways to detect or identify these system vulnerabilities which are as
follows:
Cyber Security Communications_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Professionals Assignment
|8
|950
|41

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Cyber Security Threat Management | Assignment
|9
|2180
|85

Cyber Security: A Mini Report on Penetration Testing and Vulnerability Assessment
|5
|761
|432

Ethical Issues in the Cyber World
|4
|1178
|341

Ethical Hacking and Penetration Testing
|3
|426
|384