Cyber Security Flashcards
What is cyber security?
Cyber security is the prevention of cyber attacks, and stopping unauthorised access to personal information stored on online and on our devices.
What is accidental damage?
Accidental damage is any damage or loss of data which is not intentional
What are examples of accidental damage?
Human error
Accidental data file deletion
Software corruption
Hardware malfunction
Natural disasters
Power failure
What is malicious damage?
Actions that are intended to cause harm to data
What are examples of malicious damage?
Malware
Phishing and social engineering
DDoS attacks
SQL injection
Insider threats
Ransomware
What are the risks with online marketing communications?
Spam and unwanted emails
Phishing and scam attempts
Privacy concerns
Ad fraud
Brand safety
Misinformation
What are the problems that can arise during online updating of files?
Unauthorised access
Man-in-the-middle attacks
Malicious software
Incomplete updates
Denial of service
Rollback attacks
What are examples of malicious software?
Virus
Trojan
Worm
Ransomware
Adware
Spyware
Rootkit
What is malware’s intended use?
Data theft
System disruption
Spamming
Cryptojacking
Extortion
What is human error?
Day to day operations involves a lot of data manipulation through typing editing updating and deleting which susceptible to human mistake
What is accidental data file deletion?
This is the result of a file or folder being accidentally deleted without an available backup leading to the permanent loss of data
What is software corruption?
I here software fails and crashes leading to data loss or corruption during data manipulation
What is hardware malfunction?
Hardware can degrade from damage done to it or mechanical failure, when hardware malfunctions it can cause permanent data loss
What are power failures?
When power is disrupted during data manipulation causing for data to be lost
What is malware?
Malicious software that infects and damages computer systems and disrupts network operation
What is phishing and social engineering?
The use of deception to trick individuals into revealing sensitive information or installing malware
What are DDoS attacks
DDoS is distributed denial of service,
It is where networks or websites are flooded with traffic to overload them, causing them to be disabled
What is SQL injection?
Attackers executing malicious code on servers by injecting it into web applications
What are insider threats?
The intentional harm of stealing sensitive information by employees or insiders
What is ad fraud?
Online advertisement is vulnerable to to being botted which leads to a wasted marketing budget and loss of credibility
What is brand safety?
The safety of the brand’s reputation which can be damaged though ads appearing on inappropriate and offensive sites
What is misinformation?
The spread of false information which leads to confusion and mistrust and potential harm
What is unauthorised access?
An attacker that doesn’t have permission gains access to the update server
What are man in the Middle attacks?
Attackers intercepts and alters update files during transmission
What are incomplete updates?
Attackers cause the updates to fail leaving systems in an insecure state making them vulnerable
What are rollback attacks?
Where attackers use old versions of files to carry out attacks
What are viruses?
Self-replicating programmes that attach themselves to other files and spread to other devices
What are Trojans?
A hidden programmes that appears legitimate but performs malicious actions
What is a worm?
A self replicating program that spreads through networks and causes damage to computer systems
What is Ransomware?
A type of malware that encrypts a users files and demands payment for the decryption key
What is adware?
A type of software that displays unwanted advertisement
What is spyware?
A program that collects and sends personal information from a users device without their knowledge
What is rootkit?
A type of malware that is designed to hide its presence and gives full control of the infected device to the attacker
What is data theft?
Stealing personal information or confidential data
What is system disruption?
Disrupting the normal functioning of a device or network
What is spamming?
Sending unsolicited emails or messages?
What is crypto jacking?
Secretly using a victim’s device to mine crypto currency
What is extortion?
Demanding payment in exchange for not carrying out malicious actions
How can the risks of online marketing organisations be reduced?
Implementing strong security protocols
Adhering to privacy regulations
And verifying sources and accuracy of information
How can risks of online updating of files be reduced?
Use secure protocols likes HTTPS or SFTP transmission
Implement digital signatures and hash functions to verify file integrity
Develop a robust incident response plan
Conduct a regular security assessments for system maintenance and updates
What are media access control (MAC) addresses? And what are they used for?
MAC addresses are unique identifiers assigned to Network Interface controllers (NICs), and are used as network addresses for communication within a network
What is MAC address spoofing? And what’s it used for?
The practice of changing a device’s MAC Address to impersonate another device on a network, it’s used to bypass security measures or evade network monitoring and detection
What are the risks of MAC spoofing?
As it allows users to bypass security measures, attackers can gain unauthorised access violating privacy.
It can also impact the performance of a network as it confuses devices leading to data loss or duplication.
How can MAC spoofing risks be avoided?
Implementation of strong security measures
Regularly monitoring network traffic
Utilising MAC authentication to require valid MAC addresses for network access
What is blockchain?
A decentralised, digital ledger for recording tamper-proof transactiond
How does blockchain work?
It uses cryptography to secure and validate transactions across a network of computers
How is blockchain used in cyber security?
Decentralised identity management
Secure record keeping
Supply chain security
Cyber threat intelligence sharing
Data privacy
Cyber insurance
What are the threats of data mining?
Data breaches
Unauthorised data sharing
Discrimination
Profiling
Lack of control
Inaccurate data
Data breaches?
Occurs when sensitive information is illegally obtained
Unauthorised data sharing?
Companies sharing personal data without an individual’s consent
Discrimination and profiling?
Data mining algorithms unfairly discriminate against specific groups, or profile individuals potentially making them targets to advertisements or discriminatory decision making
Lack of control and inaccurate data?
Users have limited control over their personal information collection and use, which can cause data mining algorithms to produce inaccurate results impacting individuals negatively