5.3 Threats Flashcards
what is phishing
where a person is contacted by someone posing as a legitimate organisation to encourage the divulging of sensitive information e.g. bank details.
This information is then used to access accounts resulting in identity theft or financial loss
what is interception
when an unauthorised party has gained access to a system resulting in illicit copying of programs or data file. wiretapping to obtain data in a network
what is data theft
the theft of data from a computer system or data intercepted during transmission across a network
what is eavesdropping
unauthorised interception of private communication e.g. phone call or message. it is used to access data e.g. installing network monitoring software onto a computer or a server so that data can be intercepted during the transmission
what is social engineering
someone is manipulated into providing confidential information. cyber criminals use this to get information relating to passwords, bank information or install malicious software to provide them with access to the information or take control of the computer system
what is hacking
unauthorised intrusion into a computer network or system
what are black hat hackers
hackers that hack to take control over the system for personal gain by destroying stealing or preventing authorised users from accessing the system
what are grey hat hackers
hackers that hack into systems and notify organisations of vulnerabilities. hacking with no malicious intent
what are white hat hackers
ethical hackers, only seek vulnerabilities when they are legally permitted to do so
what is a virus
malicious code that copies itself into another program and changes how the computer system works. caused by someone spreading it through emails or links or inserting removable storage devices
what is a trojan
a trojan hides within what appear as a harmless program or will trick someone into installing it. It collects information on the system and sets up holes in the security or takes over the system and locks out an authorised user
2 types of trojan threat
trojan banker - steals account data for online banking
trojan IM - steals logins and passwords from instant messaging programs