1.8.5 Information Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Data as a commodity

A

Data is a very valuable commodity.
Personal data can be used to impersonate individuals to gain access to their assets.
Outsiders can exploit the financial data or trade secrets of organisations to gain a competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data theft

A

Data theft is a serious concern for any organisation.
The loss of customers’ personal data can result in significant fines.
Data theft can happen as part of different methods such as:
Insider attacks.
Man-in-the-middle attacks.
Packet sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protection from data theft

A

Data interception and theft is best prevented by employing a range of preventative measures such as:
Encrypting data.
User access levels.
Network policies.
Educating users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet sniffing

A

Packet sniffing is where a hacker will intercept data as it is being transmitted across a network.
Sniffing software reads and displays the content of all packets being sent on a network.
Packet sniffing is a form of passive attack.
One of the best ways to protect against packet sniffing is to use encryption so that packets cannot be decoded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider attacks

A

An insider attack is where someone with privileged access to information (e.g. an employee) uses their access to steal information from the company, and gives it to others.
Attackers often have financial or ethical motivations.
The risk of insider attacks can be reduced using:
Firewalls.
User access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MITM Attacks

A

A man-in-the-middle (MITM) attack is where an attacker will intercept a device’s connection to the Internet.
This is often done by tricking users into signing into a fake WiFi hotspot.
The man-in-the-middle can then see all of the victim’s traffic, such as personal information.
This is one of the reasons why users should be very careful if they join a public WiFi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL Attack

A

Structured Query Language (SQL) is a language used to access databases.
SQL injection is a form of active attack that exploits SQL execution on web servers.
Attackers ‘inject’ specially formatted code into fields in the website, which when run on the server allow them to bypass login screens or damage the data kept on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly