B1 Threats to data Flashcards
Why might an organisation have their system attacked?
Information can be sold to competition of the organisation or customer details can be stolen and used in identity theft.
Some people enjoy the challenge of breaking into a system. They get credibility for their achievement from other hackers.
This can motivated as an attack on an organisation or can be carried out as a challenge. It often is carried out by preventing access to on-line services i.e. DoS attack
Somebody will attack the system as a form of revenge on the organisation e.g. an ex-employee.
Often ransomware is used in an attempt to force organisations to pay money in order to have access to their files/system.
To steal from the company, usually designs and other business ideas.
What is a black hat hacker?
A black hat hacker will gain access to a computer system without permission
The hacker looks for vulnerabilities in a computer system. They the use this as a way into the system, with the intent to cause disruption or for financial gain
Black hat hacking is illegal
What is malware?
Malicious software
Ransomware
Malware which stops the user having access to their data unless a ransom is paid. Some malware encrypts files.
Rootkit
Malware often hidden in the operating system of the computer. They are useful to intercept data from network connection and also what is typed in from the keyboard.
Virus
A program which is installed to stop a computer working or to effect the operation of a computer. It is often installed via email or other programs. Once on the computer the virus can replicate itself.
Trojan horse
Often disguised as legitimate software, the software enables hackers access to a computer and hence the data it contains.
Spyware
Malware which allows information to be collected about a person e.g. usernames and passwords.
Worms
A program that replicates itself across computers, via network connections.
They can be used to turn computers into bots, or allow access for other malware.
BOTNET
A NETwork of computers, each called a BOT, which are used to transmit a virus or launch attacks on networks/computers.
The Bot can take control over the infected computer:
It might be infected with malware e.g. keyloggers, this would make it possible to access data or passwords
It might sit on a computer until the creator wants to use it
It might collect data from a business
Denial of service attacks
A website is made unavailable, as it is unable to cope with the large amount of traffic visiting the site
This type of attack is usually committed against organisations who are reliant on their website to function on a day to day basis e.g. banks or large online retailers
A botnet is often used to create fake requests to the website, thus not leaving any capacity for the system to deal with legitimate traffic
Reasons for DoS
High profile companies often targeted to cause disruption and prevent them from trading leading to a loss of revenue
Some hackers will cause DoS to prove they can, this could damage the reputation of the business leading to a loss of customers
Phishing
When an individual or organisation receives an email, text or phone call from somebody who pretends to be from an organisation e.g. a bank
The aim is to get the recipient to give out sensitive details, e.g.
bank details
passwords
access to computers
Pharming
An internet user is directed from what they believe to be a legitimate site to a bogus site
Once at the bogus site personal details, for example passwords and credit card details can be obtained
Social engineering
A criminal will set up a scenario, pretending to be from a legitimate organisations
They will try to collect the information that they require by gaining the trust of the person they are talking to
Often they take the form of telesales people or people working on a help desk
Shoulder surfing
Spying on another person to gain personal information e.g. passwords
Often done in public places, e.g. at cash machines, when one person is behind the person using the machine and looking over their shoulder
Man-in-the-middle attack
Data is intercepted between two devices
Passwords and other sensitive information can be intercepted
Often relies on the use of unsecured or poorly secured Wi-Fi
Internal threats to digital systems and data security
Unintentional disclosure of data
Systems may be left open so unauthorised persons can see data
Data may be sent to the wrong recipient
Loss of portable storage devices
Intentional stealing of leaking of information
Industrial espionage
Selling information to competitors
Removal of customer data to take to new organisation when leaving a job
Users overriding security controls
Users will try to gain additional information, from secure areas of the system, that they do not have permission to access
Use of portable storage devices
Data can be uploaded to a device and taken from the organisation
The device used may contain a virus which then infects the system
Downloads from the internet
A virus may infect the system if unknown attachments are opened from emails or software is downloaded from an unverified source
Visiting untrustworthy websites
Viruses may be downloaded onto the system
Impact of security breach
Data loss
Damage to public image
Financial loss
Reduction in productivity
Downtime
Legal action