Computer Misuse Flashcards
Computer Virus
A piece of software attached to genuine files, designed to replicate itself and perform malicious actions.
e.g. Melissa
Worm
A standalone piece of software that replicates and then executes itself, without needing a host file to work.
e.g. I Love You
Backdoor
A malware allowing access to a particular system at a later time by leaving a ‘backdoor’, bypassing normal security measures.
Trojan Horse
A piece of software that looks like a genuine application, but includes a component that performs malicious actions such as keylogging or a backdoor.
Ransomware
A malware that encrypts files on a system, refusing to unlock them unless a sum is paid.
e.g. WannaCry, Rensenware
Phishing
A method used by hackers to trick victims into revealing sensitive information or performing a task.
Cyberwarfare
Hacking a nation state or international organisation, aiming to damage its computers, information networks and security systems.
e.g.
Hacktivism
Hacking for politically or socially motivated reasons.
e.g. Anonymous, LulzSec
What are the three “crimes” of the Computer Misuse Act?
Unauthorised access;
Ulterior intent;
Unauthorised modification.
RIPA
An individual who is believed to have cryptographic keys may face up to two years in imprisonment for failing to hand them over.
e.g. of usage: Lucy McHugh case
What are black-hat, white-hat and grey-hat hackers?
Extra: Blue-hats, green-hats and red-hats?
Black-hat hackers try to break into systems with malicious intent.
White-hat hackers try to break systems with the intent of helping these systems strengthen themselves.
Grey-hat hackers move between both, but never use their skills for personal gain.
Honorable mentions: blue-hats (testers before release), green-hats (new hackers), red-hats (attack black-hats)