Chp 8: Cybersecurity threats Flashcards
What is the AIC triad?
Key cybersecurity objectives:
- Availability
- Integrity (of data and processing)
- Confidentiality
What is malware?
Short for malicious software
Attempts to gain unauthorised access to organisations to steal information or cause damage
What is a virus?
Malware that attaches to existing programmes and spreads as the programme is used
Usually require a target or host to ‘activate’ it
What is a worm?
Similar to a virus but is it’s own standalone software
Also don’t require ‘activation’
What are trojans?
Doesn’t spread once infiltrated but can operate a number of functions, including giving another user access
What is a bot?
An automated oricess that can act in a number of ways, including acting as keyloggers, recording a users passwords
What is a Malvertising?
An online advert that contains hidden malware
What are six system defences against malware?
- Perimeter defences - firewalls
- Monitoring actions of emails
- Segmentation
- Gatekeeping controls - reCAPTCHA
- Software updates
- Back-up copies
What are the following forms of cyberattacks?
- Spear Phishing
- Smishing
- Vishing
- DDoS
- Spear Phishing - phishing a single target thorugh email
- Smishing - phishing using text messages
- Vishing - phishing using phone calls
- DDoS - Distributed denial of service attacks attempt to flood a system with more activity than it can cope with
What are the following forms of cyberattacks?
- Structured Query Languge Injection (SQL)
- XSS attacks
- Buffer overflow attacks
- Structured Query Languge Injection (SQL) - software that gains access through data entry, like an online sale
- XSS attacks - Cross-site scripting attacks, that embed malware in an innocent webiste which attacks an organisation when it goes on the website
- Buffer overflow attacks - a form of DDoS that is relatively simple
What are the following terms?
- Ethical Hacker
- Unethical Hacker
- Social Engineering
- Grey-Hat Hacker
- Bug Bounty
- Ethical Hacker - finds weaknesses for their employer
- Unethical Hacker - malicious hackers
- Social Engineering - exploiting someones trust to gain access/data
- Grey-Hat Hacker - don’t work for an organisation but will find weaknesses and fix them for a fee
- Bug Bounty - a reward for anyone who finds a vulnerability in it’s system
What six ways did Robert Cialdini suggest people are influenced?
- Reciprocation
- Commitment and consistency - avoiding being a hypocrite
- Social proof - mimicking the behaviour of others around us
- Liking - copying those we like
- Authority - trusting authority
- Scarcity - shortages can increase somethings value