05 Security Policies Flashcards
Name different security threats.
- Criminal vandalism/sabotage
- Hacking or theft
- White collar crime
- Natural disasters (e.g. flooding and fire)
- Accidents and errors
- State-sponsored hacking
- Politically-motivated attacks or data breaches
- Terrorism
What is hacking? Give an example.
Hacking is when an individual or criminal gang find a way to break into a company’s ICT systems. Once in, they may steal customers’ information, especially bank account details. Or, hackers may use ransomware to encrypt company files. They then demand the company pays them a ransom to unencrypt the files.
What is it called when an individual or criminal gang find a way to break into a company’s ICT systems?
Hacking.
Give an example of white collar cyber security crime.
White collar cyber security crimes occur when an employee uses their access to ICT systems to steal information from their company, or misuses the network for criminal activity. For example, an employee in a bank might steal customers’ account details. Or, they might sell confidential information to a rival company.
When an employee uses their access to ICT systems to steal information from their company or misuses the network for criminal activity it is known as what?
White collar cyber security crime.
An employee in a bank stealing customers’ account details or selling confidential information to a rival company is an example of what?
White collar cyber security crime.
Why are natural disasters a security threat?
Natural disasters, for instance flooding, could damage a company’s data centre. The company could lose important information due to this and would need to replace the equipment damaged.
Give an example of a security threat due to misuse or accidents.
Common mistakes that employees make include accidentally deleting important data, and sending confidential information by email to the wrong people.
Describe state-sponsored hacking.
State-sponsored hacking occurs when a country uses its cyber-security expertise to attack another country’s ICT, or a specific company that it doesn’t approve of.
When a country uses its cyber-security expertise to attack another country’s ICT, or a specific company that it doesn’t approve of; it’s known as what?
State-sponsored hacking.
Describe an example of state-sponsored hacking involving the entertainment industry.
When Sony Pictures launched a comedy film about the leader of North Korea in 2014, a hacker group allegedly backed by the government attacked Sony’s ICT systems. It posted on the internet copies of their films and confidential emails about film stars. Sony initially withdrew the film, but later changed its mind.
Give an example of state-sponsored hacking involved an industrial target.
Allegedly, the Stuxnet virus was created by the US and Israeli governments to attack Iran’s nuclear facility in 2010. The virus caused equipment at the plant to run out of control. Stuxnet has since been described as the most dangerous virus ever released.
Give an example of a politically-motivated data breach.
Edward Snowden was an IT security contractor employed by the National Security Agency in the United States. In 2013, he leaked thousands of documents to journalists in protest at the US governments secret mass surveillance of American citizens.
Give examples of physical access security.
- Doors
- Locks
- Keypad codes
- Swipe cards
- Voice recognition
- Facial recognition
- CCTV
How can physical access security protect companies?
Physical access security can protect data centres and sever rooms so that only authorised people can enter.