Chapter 7: Cyber Security Flashcards
Causes of data corruption and loss
- Human error
- Power failure
- Hardware failure or damage
- Malicious software or viruses
Human error
Storage devices may be accidentally damaged during transport
Make regular backups of data
Use adequate protection when transporting storage devices
Power failure
If the power supply to a computer fails, data in the process of being written to a storage device may be corrupted and data that is stored in volatile memory but not yet written to a storage device will be lost
Make regular backups of data
Set up a uninterruptible power supply (UPS) so storage devices can complete any write operations in case of a power failure
Hardware failure or damage
All magnetic, optical and solid-state storage device can fail, either due to overuse, manufacturing deflects or age
Make regular backups of data
Check storage devices regularly and replace them immediately when signs of failure are detected
Malicious software or viruses
Some malicious software may purposely damage and corrupt data as a way of attacking the computer
Make regular backups of data
Install anti-virus and anti-spyware software, as well as perform regular scans and updates
When does unauthorised access occurs?
- Poor authentication
- Poor access control or authorisation
- Poor understanding of privacy policies
What is authentication?
The process of verifying the identity of a user
Authentication Factors
- Own
- Know
- Unique
Ways to prevent authentication
PASSWORDS
Keep passwords secret and safe
BIOMETRICS
Choose an appropriate biometric measurement that is difficult to replicate
SECURITY TOKEN
Keep security token in a secure location at all times
Ways to prevent access control or authorisation
FILE PERMISSIONS
Use file permissions in combination with encryption
FIREWALL
Configure the firewall to block traffic from certain well-known harmful programs
ENCRYPTION
Keep secrete keys private and safe
Ways to prevent understanding of privacy policies
SOCIAL NETWORKING SITES
Read and fully understand the privacy policy of the social networking site
Cookies
A small file used by websites to store personal information on a users web browser
Although not malicious in nature, cookies are sometimes misused to collect personal information about users
Pharming
The interception of requests sent from a computer to a legitimate website and redirected to a fake website to steal personal data or credit card details
The stolen data can then be used for unauthorised access to even more of the victim’s data
More difficult to detect then phishing as the fake website users the same address as the real website
Phishing
The use of emails and fake websites that appear to be from reputable companies to steal personal information such as passwords and credit car numbers from users
The stolen data can then be used for unauthorised access to even more of the victims data
Spamming
The mass distribution of unwanted messages or advertising to email addresses which are collected from sources such as public mailing lists, social networking sites, company websites and personal blogs