1 - Intro Flashcards
What is the Computer Misuse Act (1990)?
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate a crime
- Unauthorised modification of computer material.
- Making, supplying or obtaining anything which can be used in computer misuse offences.
What are some definitions of Cyber Security / defence?
“..prevention and detection of unauthorised actions by users of a computer system” – Deiter Gollman
“the prevention and detection of unauthorized actions by users of a computer” - Microsoft
What is CIA?
Confidentiality
– Prevention of unauthorised disclosure of information
Integrity
– Prevention of unauthorised modification of
information
Availability
– Prevention of unauthorised withholding of information or resources
What is a vulnerability?
Part of a system that can be exploited
What is a threat?
Potential exploitation of a vulnerability
What is an attack?
Attempted violation of a vulnerability
What are some common threats?
Hackers - white, black, grey
Script Kiddies
Insiders (Snowden)
Spies - NSA, GCHQ
What is the motivation behind attacks?
Money
Bragging
Steal, alter or delete data
Revenge
Can some events appear as an attack?
Odeon cinema site went down as too many booking tickets for Star Wars
What are some types of attacks?
Active and Passive