Cyberterrorism Flashcards

1
Q

What is Cyberterrorism?

A

Cyberterrorism = Unlawful attacks/ threats of attacks against computers, networks and the info stored in them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the aims of Cyberterrorism?

A
  • Intimidate or coerce Gov. or its people towards specific political or social objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Cyber Attack?

A
  • When there is an unauthorised access to system/network by a 3rd party.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of Cyber Terror?

A
  1. Unstructured - (simple).
  2. Structured - (advanced).
  3. Coordinated - (complex).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Unstructured cyber terror?

A
  • Basic hacks.
  • Against individual systems using tools created by someone else.
  • Organisation possesses little target-analysis, command+control and learning capability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Structured cyber terror?

A
  • Sophisticated attacks.
  • Against multiple system or networks, and possibly to modify or create hacking tools.
  • Organisation possesses an elementary target-analysis, command+control and learning capability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is coordinated cyber terror?

A
  • Coordinated attacks.
  • Can cause mass destruction against integrated, heterogenous defences (including Cryptography).
  • Organisation possesses highly-capable target-analysis, command+control, and organisational learning capability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of Hackers?

A
  1. Black Hat Hackers.
  2. White Hat Hackers.
  3. Grey Hat Hackers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Black Hat Hackers?

A
  • Cyber criminals that illegally crack systems with malicious intent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are White Hat Hackers?

A
  • Ethical security hackers that try to uncover system weaknesses and fix them to strengthen a systems overall security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Grey Hat Hackers?

A
  • Uncover weaknesses, don’t exploit them but instead report them but them may demand payment in exchange for providing full details of what they uncovered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are most common Cyber attacks?

A
  1. Malware.
  2. Phishing.
  3. Man-in-the-middle.
  4. Denial of Service.
  5. Watering Hole.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Malware cyber attack?

A

Malicious software viruses (trojans, spyware, adware).

Trojans - Disguises itself as malicious software.
Spyware - Steals confidential data without you knowing.
Adware - Displays advertising content on a user’s screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Phishing cyber attack?

A
  • Attacker impersonates to be a trusted contact and sends email fake emails with malicious link to allow hacker to gain access to confidential info.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Man-in-the-middle cyber attack?

A

Attacker comes in between 2-party communication (e.g. zoom) and hijacks the session then hacker steals and manipulates data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Denial of Service cyber attack?

A

Attacker targets systems, networks and floods them with traffic to overwhelm systems and closes/slows websites.

  • Threat to businesses as leaves legitimate services requests unattended whilst system is overwhelmed.
17
Q

What is a Watering Hole cyber attack?

A

Attacker attacks websites that are frequently used by target group and infects these websites with MALWARE which attacks user’s personal info.

  • Websites are identified by closely monitoring target or guessing.