Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1.

CEH: Certified Ethical Hacker


This certification teaches you how to think and act like a hacker. Topics include hacking
technologies, the latest vulnerabilities, information security laws, and standards. Students are
put through real-time scenarios, exposed to hacking techniques, and taught how to scan, hack
and protect their system from the same. This course benefits security professionals, site
administrators, and anyone concerned with network security. Before applying to a penetration
tester position, arm yourself with this certification

2. CISM (Certified Information Security Manager)


This certification gives you the tools to excel in the management part of cybersecurity. Some
topics of interest include:

 Security Risk Management


 Program Development and Management
 Governance
 Incident Management and Response

3. CompTIA Security+
CompTIA is a respected authority in the cybersecurity industry, offering various certifications to
support growth in cybersecurity careers and education. The CompTIA Security+ certification is a
great certificate in cybersecurity for IT professionals just starting in the security field. The exam
covers a wide range of topics, like cyber attacks, incident response, architecture and design,
governance and compliance, risk management, and cryptography.

4. CompTIA Advanced Security Practitioner (CASP)


the CASP is an advanced cybersecurity certification with hands-on experience in security
engineering and architecture. Other topics covered include cryptography and governance.
Despite the advanced level, this isn’t one of the best cybersecurity certifications for managers;
instead, it’s a better fit for professionals who wish to work in technology as architects and
engineers.

5. CISSP (Certified Information Systems Security Professional)


The CISSP is one of the best cybersecurity certifications for programmers and professionals
seeking to advance their careers in the industry. It’s certainly not for beginners, requiring 5+
years of experience. It’s not uncommon to see security engineers and chief information officers
with this designation; however, they likely have many others as well. The CISSP certification is
the most common requirement or preferred qualification for cybersecurity job postings.
6. GSEC: GIAC Security Essentials
The Global Security Essentials Certification (GSEC) is one of the top cybersecurity certifications
for beginner programmers looking to dive into the cybersecurity field. An entry-level
certification, the GSEC is designed for professionals who aspire to occupy ‘hands-on’ security
roles. Some topics covered include active defense, cryptography, cloud security, and incident
response. And, graduates will have a strong basis to have authority in roles in these fields:

 Information Security Program Development and Management


 Information Security Management
 Software Development Engineering
 IT Auditing

7. ECSA: EC-Council Certified Security Analyst


the EC-Council Certified Analyst certification is a great choice for professionals interested in
penetration testing positions. This certification is similar to the CEH certification. This
certification gives you an understanding of hacking tools and the latest technologies. This
certification is suitable to apply for more roles like Network Server Administrator, Information
Security Tester, Firewall Administrator, System Administrator, Risk Assessment Professional,
and more.

8. SSCP: Systems Security Certified Practitioner

Offered by (ISC)2, this certification ensures you’re equipped with advanced technical skills to
implement, monitor, and administer IT infrastructure using best security practices, procedures,
and policies established by cybersecurity experts. Some topics this certification deems you
competent in include security administration, application security, incident response, and risk
identification.

Q2.
Part 1
1. The roll of internet The internet is a universal technology platform that allows any
computer to communicate with any other computer in the world. Furthermore, one of
the advantages of the internet is that nobody really ‘owns’ it. It is a global collection of
networks, both big and small. These networks connect together in many different ways
to form the single entity that we know as the internet.
2. The internet has revolutionized communication and thereby its contribution to
information sharing. With access to a computer and an appropriate connection, anyone
can interact with others worldwide; however the web is designed to exchange
unstructured information: while people can read web pages and understand their
meaning, computers cannot.
Web services play a complementary and dominant role in building global IS for today’s dynamic
business world. Web services are self-contained, modular applications that can be described,
published, located and invoked over a network.
Web services perform functions ranging from simple requests to complicated business
processes. Once a web service is developed, other applications and other web services can
discover and invoke the deployed service through universal description, discovery and
integration. The idea of web service is to leverage the advantages of the web as a platform to
apply it to the application services. We use them, not just to the static information.
Web services tools are available for most computer systems, including mainframes and
packaged applications. This means that not only the existing applications can be retained, but
also the existing knowledge of staff can be applied and extended using web services for
business integration.
Web services are adaptable and can handle changes ore readily than other integration
solutions, because they use structured text as their message format.

Part 2
Security threats can cause significant and irreparable damage to the finances and reputation
of an organization. No company should take these threats lightly. It only takes one
vulnerability or lapse to destroy everything a business worked hard to build from the ground
up.

APT (Advanced Persistent Threats)


Cybercriminals that conduct Advanced Persistent Threats (APTs) want to play the long game
when hacking an organization. They move stealthily and in detailed coordination to infiltrate
a computer network, finding entry and exit points that will allow them to remain undetected.
Once inside an enterprise, they snoop around, install custom malicious code, and gather vital
data and sensitive information.
They use state-of-the-art technology such as malware and computer intrusion techniques to
destroy the cybersecurity of an organization. These digital attackers are relentless, opting to
deploy subtle means to gain access to a company to cause damage.
1. Access Infiltration
2. Strengthening of Grip
3. Infesting the System
4. Lateral Activity
5. Deep Machinations

Distributed Denial of Service (DDoS)


The disruption of a website is the primary goal of cybercriminals when they deploy
Distributed Denial of Service or DDOS.
In a nutshell, they swarm a target network with artificial requests to overload the system in a
way that will trigger its malfunction. Legitimate users or clients will then have no access to
the website because it will go offline. DDoS can cause significant losses in production
because of these unnecessary disruptions.
It is difficult to stop a Distributed Denial-of-Service attack because the incoming barrage
doesn’t come from a single origin. Envision a restaurant wherein an unruly crowd gathers in
the front door to cause a commotion.

Ransomware
Ransomware is digital extortion, a form of malware from cryptovirology that hackers
execute and encrypt to perfection once they have established a presence in your network.
They steal vital corporate data or sensitive personal information of clients and then threaten
the victim organizations to compromise these data unless the company pays a ransom.

Phishing
Phishing is one of the essential means of cybercriminals in hacking a system. It is the
gateway to other advanced security threats such as ransomware and Distributed Denial of
Service (DDoS).
Trickery is the primary element of phishing. Digital attackers craft email blasts that make it
appear as though it originated from a legitimate source. Unknowingly clicking through these
attachments or links can infect a computer and its network.

Botnet
A botnet is a portmanteau that refers to both “robot” and “network.” It is a collective term for
private computers suffering infestations from malware, making them vulnerable to remote
access by cybercriminals without the organization’s knowledge.
Q3.

The sensor interoperability issues may arise when a biometric sensor is replaced without
recapturing the corresponding templates. Interoperability is how system works when
different set of devices are used.

Interoperability in biometrics refers to the ability of biometric systems to work together


and exchange data in a seamless and consistent manner. There are several issues that
can impact the interoperability of biometric systems:

1. Different biometric modalities: Different biometric systems may use different


modalities, such as fingerprint, facial, or iris recognition. This can create
difficulties in exchanging biometric data between systems that use different
modalities.
2. Different data formats: Biometric systems may store biometric data in different
data formats, which can make it difficult to exchange data between systems.
3. Different security protocols: Different biometric systems may use different
security protocols to protect biometric data, which can create difficulties in
exchanging data between systems.
4. Different standards: There is a lack of standardized protocols and APIs for
biometric systems, which can make it difficult for different systems to
interoperate.
5. Limited interoperability between legacy systems: Older biometric systems may
not be designed to interoperate with newer systems, which can create difficulties
in exchanging data between the two.
6. Privacy and security concerns: The exchange of biometric data raises privacy and
security concerns, as biometric data is sensitive and can be used to uniquely
identify an individual. This can make it difficult to exchange biometric data
between systems in a manner that preserves privacy and security.

You might also like