B1 Threats to data Flashcards

1
Q

Why might an organisation have their system attacked?

A

Information can be sold to competition of the organisation or customer details can be stolen and used in identity theft.
Some people enjoy the challenge of breaking into a system. They get credibility for their achievement from other hackers.
This can motivated as an attack on an organisation or can be carried out as a challenge. It often is carried out by preventing access to on-line services i.e. DoS attack
Somebody will attack the system as a form of revenge on the organisation e.g. an ex-employee.
Often ransomware is used in an attempt to force organisations to pay money in order to have access to their files/system.
To steal from the company, usually designs and other business ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a black hat hacker?

A

A black hat hacker will gain access to a computer system without permission
The hacker looks for vulnerabilities in a computer system. They the use this as a way into the system, with the intent to cause disruption or for financial gain
Black hat hacking is illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Malware which stops the user having access to their data unless a ransom is paid. Some malware encrypts files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

Malware often hidden in the operating system of the computer. They are useful to intercept data from network connection and also what is typed in from the keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus

A

A program which is installed to stop a computer working or to effect the operation of a computer. It is often installed via email or other programs. Once on the computer the virus can replicate itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan horse

A

Often disguised as legitimate software, the software enables hackers access to a computer and hence the data it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Malware which allows information to be collected about a person e.g. usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A

A program that replicates itself across computers, via network connections.
They can be used to turn computers into bots, or allow access for other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BOTNET

A

A NETwork of computers, each called a BOT, which are used to transmit a virus or launch attacks on networks/computers.
The Bot can take control over the infected computer:
It might be infected with malware e.g. keyloggers, this would make it possible to access data or passwords
It might sit on a computer until the creator wants to use it
It might collect data from a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of service attacks

A

A website is made unavailable, as it is unable to cope with the large amount of traffic visiting the site
This type of attack is usually committed against organisations who are reliant on their website to function on a day to day basis e.g. banks or large online retailers
A botnet is often used to create fake requests to the website, thus not leaving any capacity for the system to deal with legitimate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reasons for DoS

A

High profile companies often targeted to cause disruption and prevent them from trading leading to a loss of revenue
Some hackers will cause DoS to prove they can, this could damage the reputation of the business leading to a loss of customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

When an individual or organisation receives an email, text or phone call from somebody who pretends to be from an organisation e.g. a bank
The aim is to get the recipient to give out sensitive details, e.g.
bank details
passwords
access to computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

An internet user is directed from what they believe to be a legitimate site to a bogus site
Once at the bogus site personal details, for example passwords and credit card details can be obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

A criminal will set up a scenario, pretending to be from a legitimate organisations
They will try to collect the information that they require by gaining the trust of the person they are talking to
Often they take the form of telesales people or people working on a help desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shoulder surfing

A

Spying on another person to gain personal information e.g. passwords
Often done in public places, e.g. at cash machines, when one person is behind the person using the machine and looking over their shoulder

17
Q

Man-in-the-middle attack

A

Data is intercepted between two devices
Passwords and other sensitive information can be intercepted
Often relies on the use of unsecured or poorly secured Wi-Fi

18
Q

Internal threats to digital systems and data security

A

Unintentional disclosure of data
Systems may be left open so unauthorised persons can see data
Data may be sent to the wrong recipient
Loss of portable storage devices

Intentional stealing of leaking of information
Industrial espionage
Selling information to competitors
Removal of customer data to take to new organisation when leaving a job

Users overriding security controls
Users will try to gain additional information, from secure areas of the system, that they do not have permission to access
Use of portable storage devices
Data can be uploaded to a device and taken from the organisation
The device used may contain a virus which then infects the system

Downloads from the internet
A virus may infect the system if unknown attachments are opened from emails or software is downloaded from an unverified source

Visiting untrustworthy websites
Viruses may be downloaded onto the system

19
Q

Impact of security breach

A

Data loss

Damage to public image

Financial loss

Reduction in productivity

Downtime

Legal action