8.1.3 Potential technical threats and vulnerabilities to systems, data and information Flashcards
Define:
Cyber Security
The practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks
Fill The Blank:
Every business, industry, organisation and individual can be the target of technical ……………. and every digital system can have ………………………..
Threats, Vulnerabilities
State:
3 examples of possible technical threats a system could face
3 of:
* botnets
* DDoS
* hacking
* Malware
* Social engineering
* Insecure APIs
* Use of ad hoc or open networks
* Eavesdropping/man-in-the-middle attacks
Fill The Blank:
An API is the ………………. that enables two, or more different software applications to …………………….
Interface, Communicate
Fill The Blank:
Over time APIs can become ……………… and this can lead to vulnerability that can be …………………
Unsecure, Exploited
Fill The Blank:
Most data is interconnected, and if one ……. is insecure then it can lead to a …………………. which can also lead to a higher risk of threat to everything this …… interacts with
API, Vulnerability, API
Explain:
A wireless ad hoc website (WANET)
A network that is created without a wireless router or an access point and the devices in the network communicate directly with each other
State:
2 main problems with ad hoc networks
- Slow data transmission rate
- Minimal security
Explain:
How a man in the middle attack works
When a hacker places themselves in the middle of a communication between two digital devices and/or the users to attempt to steal data and information
Fill The Blank:
An attacker may steal financial ……….. or ……..-…. details which may be posted to the …………. …….. where they can be bought and used by other attackers
Data, Log-in, Dark Net
Define:
Hacker
Someone who uses computers to gain unauthorised access to data
Define:
Dark Net
Networks that are not indexed by search engines; they can only be accessed by people with the relevant credentials and authorisation