Chapter 8 - Cyber Security Threats Flashcards
Information we need to protect
Personal identifier information (PII)
Business information
Classified information
Changes that can impact cyber security
Expansion
Acquisitions
Restructuring (new approvers in ICIS)
Hardware changes
Changeover Methods for systems
Direct changeover - brand new, lots of different
Parallel - safe but expensive
Pilot Changeover - one goes first before the others
Phased - by department or system
Malware types
Ransomware
Trojans
Virus
Spyware
Application Attacks
Denial of Service
Distributed Denial of Service
SQL injection
Buffer overflow - large amounts of new data erase old
Social engineering
Reciprocity Scarcity Authority Consistency Liking Consensus
3 broad areas a threat could come from
Technical deficiency - out of date software
Procedural deficiency - staff not following IT rules
Physical - flood or fire
GDPR
Data held must be for a good reason
Lawful and proportionate
Information must be protected
GDPR Fines
£10m or 2% if fail to protect data
£20 or 4% if fail to gain consent or act lawfully