16. Data security and integrity process Flashcards
What are some potential threats to computer systems?
- natural disasters
- hardware failure
- software failure
- malicious damage
- accidental damage
What is a hacker?
A person who attempts to gain unauthorised access to a computer system with the intent of damaging data or somehow harming that system
What is a black hat hacker?
A hacker who attempts to gain access to data via immoral means, typically to steal company secrets or cause damage.
What is a white hat hacker?
Security experts employed by a company who try and find vulnerabilities in a system and fix them.
What is a grey hat hacker?
A hacker somewhere in between a white and a black hat hacker, they attempt to find vulnerabilities in systems but are not employed. What they do is technically illegal but they do not cause or have any intentions to cause damage.
What is malware?
Computer code written with the intent to frustrate or harm.
What are the types of malware?
- trojan
- worm
- keylogger
- virus
- spyware
- botnets
What is a trojan?
A piece of malware that disguises itself as something harmless, but it causing damage in the background.
What is a worm?
A standalone piece of malware that replicates itself and spreads to other devices.
What is a botnet?
A network of private computers that are infected with malware without the owners’ knowledge so that they can be controlled.
What is a keylogger?
A piece of malware that records every keystroke of a user.
What is spyware?
A piece of malware that obtains information from a device by transmitting data from their device
What is a virus?
Pieces of code that are capable of copying themselves and are typically to have a detrimental
What is a denial of service attack (DoS)?
When an attacker floods a server with useless traffic, causing the server to overload
What is a distributed denial of service attack (DDoS)?
When multiple systems orchestrate a synchronised attack from many locations at once.