• Home
  • Blog
  • Research and give a practical example of the first step of the kill chain.

Research and give a practical example of the first step of the kill chain.

0 comments

1. Define the terms Authentication, confidentiality, integrity, and availability.

2. Describe the following terms used for attackers:

Black hat hacker

White hat hacker

Gray hat hacker

3. Research and give a practical example of the first step of the kill chain.

4. An organization that purchased security products from different vendors is

demonstrating which security principle? Explain.

a. obscurity

b. diversity

c. limiting

d. layering

5. Consider an automated teller machine (ATM) in which users provide a personal

identification number (PIN) and a card for account access. Give examples of

confidentiality, integrity, and availability requirements associated with the system. In

each case, indicate the degree of importance of the requirement.

6. Read the article “Aspects of Internet Security.” Compose a paper of no more than 2

pages that summarizes the key concepts that emerge from the paper.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}