1B Unit 6 Critical Thinking Questions
.docx
keyboard_arrow_up
School
University of North Carolina, Asheville *
*We aren’t endorsed by this school
Course
1
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
2
Uploaded by HighnessRatPerson356
Noah Campbell 1/3/24
Critical Thinking Questions
1.
With cybersecurity, better protecting the digital landscape can be done by putting yourself in the shoes of people trying to harm it, like black hat hackers. What other industries or businesses may benefit from the same kind of backwards approach? For example, could banks be better secured if we designed them while peering into the mind of a bank robber? Come up with another example like this and use it to evaluate this concept.
High profile companies who need to make sure their network security is flawless are the kinds of industries or enterprises that can profit from the same kind of retrograde strategy. If we created banks with a bank robber's perspective in mind, they would not be much better, as the robber would always leave space for flaws that hackers may subsequently exploit.
2.
The best way to model threats against computer systems is to step into the criminal’s shoes, adopt their mindset, and consider all the different ways they might attack. But how might doing this be problematic or lead to negative consequences? (Think white hats going over to the dark side.)
This might be problematic because a black hat hacker may leave exploits/flaws in the systems for other hackers to discover when attacking the system. White hat hackers are ethical in the sense that they won't cross a line when it comes to performing their hacking services. Criminals will make it seem like the system is fully operational and safe for use, but it will actually be flawed
for many hackers who know their way around exploits.
3.
What is the first step a successful hacker is most likely to perform as part of their attack on a system? How can knowing and understanding this step be useful for a white hat hacker, and what can they do to use this information to stop a black hat hacker from even getting through the first step of an attack? Explain.
The first step a successful hacker is most likely to perform as part of their attack on a system is reconnaissance. This can be useful for a white hat hacker because they can help prevent any incoming attacks that may occur on the network by being able to survey the network beforehand. This can all be done before the first step of an actual attack.
4.
Consider the possible responses to perceived risk listed in the unit. Which of these do you think is most frequently used? Why? Which do you believe would be the most difficult to employ and why? Explain.
The perceived risk that is most commonly used is avoid it. This is because many people are out and about and can access their data anywhere in the world. However, this has its repercussions if
you are in a public area and a hacker may try to gain unauthorized access to your data. The most difficult one to employ would be the transfer of risk because not everybody will have the access to transfer sensitive information from one place to another.
5.
One of the possible responses to a perceived risk is to mitigate it. What exactly does this mean? Do a bit of online research into the various mitigation strategies. How could you appropriately conduct one of these mitigation strategies in the face of a possible risk?
Mitigating means having the effect of making something bad less severe, serious, or painful. In terms of cybersecurity, it means to reduce the risk when the risk is high. In the face of a possible risk, you can use different mitigation strategies such as doing hardware assessments, securing wireless networks, backing up data, and many more.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help