Cyberterrorism Flashcards
What is Cyberterrorism?
Cyberterrorism = Unlawful attacks/ threats of attacks against computers, networks and the info stored in them.
What are the aims of Cyberterrorism?
- Intimidate or coerce Gov. or its people towards specific political or social objectives
What is a Cyber Attack?
- When there is an unauthorised access to system/network by a 3rd party.
What are the types of Cyber Terror?
- Unstructured - (simple).
- Structured - (advanced).
- Coordinated - (complex).
What is Unstructured cyber terror?
- Basic hacks.
- Against individual systems using tools created by someone else.
- Organisation possesses little target-analysis, command+control and learning capability.
What is Structured cyber terror?
- Sophisticated attacks.
- Against multiple system or networks, and possibly to modify or create hacking tools.
- Organisation possesses an elementary target-analysis, command+control and learning capability.
What is coordinated cyber terror?
- Coordinated attacks.
- Can cause mass destruction against integrated, heterogenous defences (including Cryptography).
- Organisation possesses highly-capable target-analysis, command+control, and organisational learning capability.
What are the types of Hackers?
- Black Hat Hackers.
- White Hat Hackers.
- Grey Hat Hackers.
What are Black Hat Hackers?
- Cyber criminals that illegally crack systems with malicious intent.
What are White Hat Hackers?
- Ethical security hackers that try to uncover system weaknesses and fix them to strengthen a systems overall security.
What are Grey Hat Hackers?
- Uncover weaknesses, don’t exploit them but instead report them but them may demand payment in exchange for providing full details of what they uncovered.
What are most common Cyber attacks?
- Malware.
- Phishing.
- Man-in-the-middle.
- Denial of Service.
- Watering Hole.
What is a Malware cyber attack?
Malicious software viruses (trojans, spyware, adware).
Trojans - Disguises itself as malicious software.
Spyware - Steals confidential data without you knowing.
Adware - Displays advertising content on a user’s screen.
What is a Phishing cyber attack?
- Attacker impersonates to be a trusted contact and sends email fake emails with malicious link to allow hacker to gain access to confidential info.
What is a Man-in-the-middle cyber attack?
Attacker comes in between 2-party communication (e.g. zoom) and hijacks the session then hacker steals and manipulates data.