8.1.3 Potential technical threats and vulnerabilities to systems, data and information Flashcards

1
Q

Define:

Cyber Security

A

The practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill The Blank:

Every business, industry, organisation and individual can be the target of technical ……………. and every digital system can have ………………………..

A

Threats, Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State:

3 examples of possible technical threats a system could face

A

3 of:
* botnets
* DDoS
* hacking
* Malware
* Social engineering
* Insecure APIs
* Use of ad hoc or open networks
* Eavesdropping/man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill The Blank:

An API is the ………………. that enables two, or more different software applications to …………………….

A

Interface, Communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill The Blank:

Over time APIs can become ……………… and this can lead to vulnerability that can be …………………

A

Unsecure, Exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill The Blank:

Most data is interconnected, and if one ……. is insecure then it can lead to a …………………. which can also lead to a higher risk of threat to everything this …… interacts with

A

API, Vulnerability, API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain:

A wireless ad hoc website (WANET)

A

A network that is created without a wireless router or an access point and the devices in the network communicate directly with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State:

2 main problems with ad hoc networks

A
  • Slow data transmission rate
  • Minimal security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain:

How a man in the middle attack works

A

When a hacker places themselves in the middle of a communication between two digital devices and/or the users to attempt to steal data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill The Blank:

An attacker may steal financial ……….. or ……..-…. details which may be posted to the …………. …….. where they can be bought and used by other attackers

A

Data, Log-in, Dark Net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

Hacker

A

Someone who uses computers to gain unauthorised access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:

Dark Net

A

Networks that are not indexed by search engines; they can only be accessed by people with the relevant credentials and authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly