2.3.2 Threats & Responsibilities Flashcards
What is Cyber Security
How individuals and organisations reduce the risk of cyberattacks, and how to prevent unauthorised access to the personal information we store on our devices and online.
What are the types of viruses/dangers
*Spam and unwanted e-mail
*Phishing and scam attempts
*Privacy concerns
*Ad fraud
*Brand safety
*Misinformation
What Does MAC stand for
The Media Access Control (MAC)
What is the MAC address for
MAC address is a unique identifier assigned to a Network Interface Controller (NIC) for use as a network address in communications within a network segment
What are the Risks for a MAC address
*MAC spoofing
* Privacy concerns
* Network security
* Network performance
What are the types of accidental damage
- Human Error
- Accidental data file deletion
- Software corruption
- Hardware malfunction
- Natural disasters
- Power Failure
What are the types of malicious damage
- Malware
- Phishing
- DDos Attacks
- SQL injection
- Insider Threats
- Ransomware
What are the security problems during online file updates
- Unauthorised access
- Incomplete updates
- Man-in-the-middle attacks
- Denial of service
- Malicious software
- Rollback attacks
Types of Malware
- Virus
- Trojan
- Worm
- Ransomware
- Adware
- Spyware
- Rootkit
Types of Operations of Malware
- Data theft
- System disruption
- Spamming
- Crypto jacking
- Extortion
What is the Blockchain (crypto)
Blockchain is a decentralised, digital ledger that records transactions
across a network of computers. It uses cryptography to secure and validate transactions, ensuring that the ledger is tamper-proof.