1 - Intro Flashcards

1
Q

What is the Computer Misuse Act (1990)?

A
  1. Unauthorised access to computer material
  2. Unauthorised access with intent to commit or facilitate a crime
  3. Unauthorised modification of computer material.
  4. Making, supplying or obtaining anything which can be used in computer misuse offences.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some definitions of Cyber Security / defence?

A

“..prevention and detection of unauthorised actions by users of a computer system” – Deiter Gollman

“the prevention and detection of unauthorized actions by users of a computer” - Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CIA?

A

Confidentiality
– Prevention of unauthorised disclosure of information

Integrity
– Prevention of unauthorised modification of
information

Availability
– Prevention of unauthorised withholding of information or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability?

A

Part of a system that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat?

A

Potential exploitation of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an attack?

A

Attempted violation of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common threats?

A

Hackers - white, black, grey

Script Kiddies

Insiders (Snowden)

Spies - NSA, GCHQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the motivation behind attacks?

A

Money

Bragging

Steal, alter or delete data

Revenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can some events appear as an attack?

A

Odeon cinema site went down as too many booking tickets for Star Wars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some types of attacks?

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly