B - Cyber Security Flashcards
Hacking
Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990
Why are systems attacked?
Fun, financial gain, industrial espionage, personal attacks, hacktivism (hacking for activism)
Types of Hackers
Black Hat - a hacker with malicious intent, Grey Hat - a hacker with neither malicious or heroic intent, White Hat - a hacker with heroic intent to stop other hackers
Types of threat to a computer system
Unauthorised access, virus, worm, botnet/DDoS attack, rootkit, trojan, ransomware, spyware
Virus
A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
Worm
a harmful computer program that can copy itself and spread across a number of connected computers
Botnet
A group of computers that are controlled by software containing harmful programs, without their users’ knowledge
DDoS
Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.
Rootkit
A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.
Trojan
A computer program that has been deliberately designed to destroy information, or allow someone to steal it.
Ransomware
Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.
Spyware
Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
Social Engineering
Manipulating people so that confidential information can be found out.
Why does social engineering work?
Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.
Types of Social Engineering
Phishing, pharming, shoulder surfing, tailgating, baiting, pretexting