Read the following passage and answer the questions given below. Some words are highlighted to help you answer some of the questions. Cybersecurity is...

Question

Read the following passage and answer the questions given below. Some words are
highlighted to help you answer some of the questions.
Cybersecurity is the practice of being protected against the criminal or unauthorized use of electronic data,
or the measures taken to achieve this. At least, that’s what the dictionary says. Over the years the term
cybersecurity has been thrown around to the point where it is almost synonymous with terms like IT
security or information security. It’s kind of like saying every square is a rectangle, but not every rectangle
is a square.
Every square is a rectangle because a square is a quadrilateral with all four angles being right angles.
Similarly, cybersecurity is a part of the IT security umbrella, along with its counterparts, physical security
and information security. But not every rectangle is a square, since the criteria to qualify as a square means
all sides must be the same length. The point is, not all IT security measures qualify as cybersecurity, as
cybersecurity has its own distinct assets to protect.
CompTIA’s Chief Technology Evangelist, James Stanger says it best when he defines cybersecurity as
“focusing on protecting electronic assets – including internet, WAN and LAN resources – used to store and
transmit that information.” Of course, the threat to these electronic assets are hackers who have malicious
intent to steal proprietary data and information via data breaches. Thus, it would seem the fully realised
definition should include an evolving set of cybersecurity tools designed to protect confidential data from
unauthorized access. To do so, it’s necessary to consider how people, processes and technology all play
equally important roles in keeping information safe.
One of the many advantages to living in a world where every device is _______________ is convenience. It’s
incredibly easy to conduct work, manage your social calendar, shop and make appointments from your
smartphone or device. That’s why it’s become second nature to many of us.
But, of course, the convenience of connected data also means threats from bad actors can do a lot of
damage. Cybersecurity initiatives are essential to protecting our data and thus, our way of life.

Based on the passage about cybersecurity, which of the following statements can be inferred?

Options

A.

People, processes and technology all play very important roles in keeping information safe.

B.

Cyber-attacks can have various objectives like financial gain, disruption and revenge and cyberwarfare.

C.

Every square is a rectangle but every rectangle is not a square.

D.

Brutal terrorist attacks all take place due to lack of cyber security.

E.

None of These

cybersecurityinferencereading comprehensioninformation security

Solve This Question

Get instant feedback with detailed step-by-step solution

Start Solving →