AS16 Flashcards

1
Q

Threats

A
  • Unauthorised access/modification of data.
  • Disclosure/Disruption of data.
  • Destruction/Loss of data/storage media.
  • Unhappy employees (leaking files, disrupting communications)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standard Clerical Procedures

A
  • Removal of data prohibited by a policy.
  • Removal of USB ports from machines to prevent theft.
  • Only hiring employees w/ no criminal record.
  • Regular data back-up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Levels of Permitted Access

A
  • Employees can only access essential data.
  • Different users can read/write data and create/remove tables to varying degrees or access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords

A
  • A combo of uppercase, lowercase, numbers and symbols is a requirement.
  • Imposing a minimum length to ensure complexity.
  • Requiring frequent changes to avoid being compromised.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Write-protect Mechanisms

A
  • A setting that can be applied to disk drives/certain folders.
  • This data can be read but not changed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-virus Software

A
  • File servers are protected with this software.
  • Regularly scans all files on a server to check for viruses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A
  • The encryption key is only known/used by the organisation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A
  • Servers are protected with firewalls which checks network traffic and blocks any suspicious traffic from accessing the internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disaster Planning

A
  • Data must be backed up.
  • Backups must be stored in an off site location.
  • Critical operations may include a system of redundancy, where other computers can account for the workload of a computer that goes down.
  • An alternative means of communication must be established.
  • Backups must have a plan of retrieval.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious Damage

A
  • Damage that had the specific intent to create such consequences.
  • A hacker gaining access to a system; A virus being installed; An employee damaging data for their gain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accidental Damage

A
  • When data is lost but there was no deliberate intention.
  • A person accidentally deleting a record; A server crash; A loss of power; Destruction of equipment in a disaster.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black Hat Hacking

A
  • Hackers breaking into systems for their own purposes.
  • Computer Misuse Act 1990, could be prosecuted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

White Hat Hacking

A
  • Hackers breaking into systems to expose flaws and advise companies on security measures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Grey Hat Hacking

A
  • Not directly hired by a company, perform pen testing to expose flaws.
  • Computer Misuse Act 1990, could be prosecuted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phases of Pen Testing

A
  • Reconnaissance (collecting publicly available data)
  • Scanning/Probing (scanning for available ports, testing addresses)
  • Gaining access (using this info to test vulnerabilities)
  • Maintaining access (changing passwords, creating backdoors)
  • Clearing tracks (deleting user logs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A
  • Software which will spread over a network by infecting emails/websites/removable devices.
  • Will deliver a payload of other malicious software.
17
Q

Trojans

A
  • Hidden in files/programs.
  • File opened = trojan activated = payload delivered.
  • Tricking users into downloading files/Using illegal peer-to-peer file sharing networks is how it spreads.
18
Q

Spyware

A
  • Tracks key presses and software use and sends details back to the hacker.
  • Used to commit identity fraud.
  • Tends to be a virus payload.
19
Q

Scare-ware

A
  • Scare-ware scares user into buying fake software in order to ‘fix a problem’ on their computer (pop-up messages).
  • Delivered via a compromised website.
20
Q

Ransom-ware

A
  • Will delete, collect or encrypt files which will be ransomed back.
  • Can take control of webcams.
  • Delivered via a payload of a virus.
21
Q

Botnets

A
  • Creates a backdoor to your computer, allowing the hacker to run your computer as part of a larger group of compromised computers.
  • Delivered via a payload of a virus.
22
Q

Attack Vector

A
  • A path/method by which a hacker can gain access to a computer/network server in order to deliver a payload.