Chapter 8 - Cyber security threats Flashcards

1
Q

What is cyber risk?

A

Cyber risk is the risk of financial loss, disruption, or damage to the reputation of an organisation caused by issues with information technology system it uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main forms of sensitive information that an organisation may hold?

A

Personal information
Business information
Classified information - held by government and could harm national security if discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the cyber security objectives?

A

Availability
Confidentiality
Integrity of data
Intergrity of processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malware?

A

Term used to describe different types of malicious software, regardless of the purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Software that prevents access to data until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is botnets?

A

Network of infected computers that are under control of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Malware that is designed to spy on the victim and report back to attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is trojans?

A

Legitimate software that secretly contains and releases malicious software onto a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malvertising?

A

Online advertising that has malicious software written into its code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus?

A

Malware that replicates itself and spreads through programs, files and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some common types of application attacks?

A

Denial of service attack
Distributed denial of service attack
SQL (Structured Query Language) injection
Cross-site scripting attacks
Man in the middle
Buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a denial of service attack?

A

Attempt to overwhelm an applications resources to prevent is from working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is distributed denial of service attack?

A

DDoS is where the source is from a number host machines, usually linked to Botnets under the control of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Structured Query Language injection?

A

SQL is a request for something of a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cross-site scripting attacks?

A

Occurs when malicious code is transmitted from a website and can access the victims’ data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the man in the middle?

A

When the application is compromised so that the users believe they are communicating directly as normal, but someone is intercepting the communications and potentially changing them

17
Q

What is buffer overflow attack?

A

Attack that overwhelms a systems resources.

18
Q

What is hacking?

A

Gaining of unauthorised access to a computer system

19
Q

What are unethical hackers?

A

Stereotypical hacker that accesses a system without permission with malicious intent

20
Q

What are ethical hackers?

A

Attempt to access an organisations systems with permission from the organisation to help them understand weaknesses

21
Q

What is social engineering?

A

Manipulation of people to make them perform specific actions or reveal confidential information

22
Q

What are the six principles that Dr Robert Cialdini identified to persuade or influence someone?

A

Reciprocity
Scarcity
Authority
Consistency
Liking
Consensus

23
Q

What is phishing?

A

Use of fradulent communications to steal sensitive information

24
Q

What is spear phishing?

A

Phishing attempt targeted at a specific individual who is deemed to have specific information or priveleged access to something

25
Q

What is business email compromise?

A

Involves impersonating an identity and asking for a particular action to happen

26
Q

What is domain fraud?

A

Where a phishing email comes from an email that looks to be legitimate, but the domain is actually fake

27
Q

What is the risks to organisations from social media?

A

Human error
Productivity
Data protection
Hacking
Reputation
Inactivity
Costs

28
Q

What are the social media risks to individuals?

A

Going viral
Trolling
Employment
Legal sanction
Physical theft
Identity fraud
Permanence

29
Q

What are the changeover method of how changing systems can be undertaken by organisations?

A

Direct
Parallel
Pilot
Phased

30
Q

What is the direct changeover method?

A

Old system switched off and new system switched on
Cheap but risky

31
Q

What is the parallel changeover method?

A

Old and new system run together for some time, until it is felt safe to switch off the old
Costly but less risky

32
Q

What is the pilot changover method?

A

One part of the business change over first and then plans rolled out to the rests of the business

33
Q

What is the phased changeover method?

A

Introduce new system one part of the business at a time
Less risky but takes longer

34
Q

What are some impacts of cyber breaches?

A

Downtime
Customer flight
Reputation damage
Legal consequences