8. Cybersecurity Risk Flashcards
What is cybersecurity?
The technology, processes and measures that are designed to protect an organisation against an attack on its electronic information
What are the 4 main challenges of cybersecurity to risk managers?
- Reliance on technology
- Availability of technology
- Inevitability of bugs
- Rapid evolution and lack of understanding
What are the 3 categories of information that a business may hold?
- Personal
- Business
- Classified
What is business information?
Anything that may cause risk to the company if discovered by a third party, such as a competitor
What is classified information?
That which could cause harm to public safety or security
What are the 4 objectives of cybersecurity?
- Availability
- Confidentiality
- Integrity of data
- Integrity of processing
What 3 things do cybersecurity objectives need in order to be implemented effectively?
- Sufficient budget and resource
- Communicated clearly
- Key stakeholder support
What are the 3 categories of factors which influence cybersecurity risk?
- Technologies
- Organisational factors
- Organisational change
What factors fall under the technologies category of influencers to cybersecurity risk?
- Outsourcing of IT services (cloud)
- Mobile devices
- Network structure
- Service providers/hosts
- Software applications
- Obsolete systems
- Dependence on emerging tech
What factors fall under the organisational category of influencers to cybersecurity risk?
- Structure/size of IT department
- Types of user groups
- Geographic location (+ legal)
- Organisational structure
- Cybersecurity responsibility
What factors fall under the organisational change category of influencers to cybersecurity risk?
- Have products or services changed?
- Any legislative change?
- Any change to org structure or departmental responsibilities?
What is malware?
Software which is specifically designed to disrupt or gain unauthorised access to a computer system
What is a virus?
A user opens or runs a host file which releases the virus, which then infects the users files and can restrict access or damage information
What is a worm?
Like a virus, but does not require the host to open a file
What is a Trojan?
Malware that masquerades as real software but infects the computer when launched
What is Spyware?
Malware that enables the originator to spy on the user’s activity
What is Malversiting?
An online advert which has malware written into the code, either directing to a site where malware can be installed or directly infecting the computer
What are Botnets?
A network of private computers infected with malware and controlled by an agent without the knowledge of the owner
What is Ransomware?
Encrypting the users data and demanding payment for it’s release
What is polymorphic malware?
Malware which avoids being detected by constantly changing its features
What is the ‘ultimate’ line of attack against malware?
Antivirus software
What are application attacks?
Attacks that target websites to alter their functionality and presentation, or extract sensitive information
What are the 4 types of application attack?
1.Bot attack
2. Distributed Denial of Service
3. Cross Site Scripting
4. SQL injection
What is a bot attack?
Web robots that are used maliciously, e.g. to send spam email addresses