D1 - Threats to data info and system Flashcards

1
Q

Why do info and system are thread?

A

This is because there are often malicious users that are trying to steal data and purposely cause harm. However sometimes that can be accidentally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Malware stands for?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

Malware is a computer program that is designed to harm or gain untheorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different types of malware?

A
  • Viruses
  • Worms
    -Trojans
    -Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are viruses?

A

A type pf malware. It is a program designed to to coy and insert its self into programs that are running on the computer system. Is then able to spread when the programs and data files is attached or passed to another system- e.g sending them as an email attachment or through files on a USB stick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are worms?

A

A type of malware. Operates similarly to viruses, the only key different is that it doesn’t need to be attached or passed to another system to be able to spread but instead they are stand alone programs that spread by tunneling through a network and exploiting security holes in systems to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are trojans?

A

It is a type of malware. It is a harmful program that disguises as a legitimate software application. It is able to spread by users downloading the program thinking it is legitimate but it hides a harmful payload (data that need to be transmitted) . It doesn’t self replicate like worms and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Spyware?

A

A type of malware. This programs monitors user activity to then steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the impact of malware on individuals and organisations?

A
  • Organizations: Depending on the malicious user internet and then type of malware that is being used, malware can be used to corrupt or delete data that is being stored on the IT systems of the organization. Which will then require them to get the data back from backups(which will be a disadvantage if the organization don’t have a backup system put in place). Therefore organization failing to follow the Data protection act
  • Individuals: Personal photos can be lost, with the use of spyware where the malicious user tracks the actions of the user and then steal personals data like bank details to then steals from them or commit identity fraud with the personal information that they have stolen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are hackers?

A

A hacker is someone who gains unauthorized access to a computer system.
They make use of programs that will go through different password that will break into the computer system and guess the actual password. This process is known as Brutal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are white hackers and are they harmful?

A

No they are not. White hackers are not malicious but instead they test the system by attempting to gain access to ensure that they organization system is secured enough to protect them from a malicious attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the impact of hackers on individuals and organizations?

A
  • Organization: Unauthorized access to an organization can be used to steal financial information to steal then steal money from them. Individuals information that organization may be holding of their personal as well as customers information that are being hold to be stolen which can then be maliciously used for identity fraud.
  • Individuals: Personal data can be stolen, which can be used for identity fraud, financial information being stolen, and blackmail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A

It is when malicious users send emails to companies that are well known, which contains a link that once it is clicked on, a form that requires personal data to be input in, and once submitted it will go to the malicious users.
The reason why businesses and individuals falls for it is due to the fact that the emails (or calls) look legitimate, therefore easier to convince people to feel safe enough to input details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the impact of phishing to individuals and organizations?

A

The main purpose of phishing is to gain personal and financial information.
- Organization: In the form that has been filled, confidential data has been shared therefore this can be used to hack or gain access important information. In addition since financial information can be stolen, money can be stolen from the organization’s account.
- Individuals: Information shared in the forms can be used to perform identity fraud, which can be then sued to get loans and steal money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Accidental Damage?

A

Data can be lost on its own or maybe caused by a damage to the IT system. Therefore not all damage to an IT system is malicious. e.g:
- Dropping the digital device where the data is stored in
- spilling liquid on them
- accidently deleting or overwriting files or folders

These are actions that are not malicious but can have big negative impact on organizations and individuals since a lot of data can be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the impacts of Accidental Damage to Individuals and Organizations?

A

-Organizations: May lose important business data such as sales records. Will require to replace lost or damaged devices which can be costly and can also slow the business down
- Individuals: Data may bel lost with emotional value , eg: photos. Will require to replace lost or damaged devices which can be costly for individuals