Data Security and Integrity Processes Flashcards
Access Levels
allowing different users to have access to different data, such as giving some people Read Only access, or allowing some people to access more data than others
APT
Advanced Persistent Threat
a set of stealthy and continuous computer hacking processes, often orchestrated by humans targeting a specific entity, usually organisations and/or nations for business or political nations
APT1
a professional cyber espionage group in China
APT28
Fancybear
state sponsored malware attacks for information gathering for foreign governments
APT29
Hamertoss
a malware backdoor using Twitter and GitHub originating in Russia
Adware
not dangerous in its own right, but may contains links to other malware, such as viruses and key loggers
Attack Vectors
describes direction of attack
Backdoor
built into a computer program that allows someone to bypass any security to get to it
Back-Up of Servers
this should be done off-site to avoid back-ups being destroyed in situations such as fires or floods that also destroy the originals, and the location should be on a need-to-know basis
Baudot Code
a 5-digit binary number used in the Vernam cipher to encrypt data
Behavioural Identifiers
consists of the exceptional ways in which individuals act, including identification of typing patterns, gait and other gestures; some of these behavioural identifiers can be utilised for constant validation
Bespoke Tools
specifically developed tools to target known vulnerabilities or poorly designed software
Biometric Exposures
high-tech cameras and other devices support usage of biometrics, but can also be used by attackers; people do not cover or hide their physical and behavioural features, therefore, attacks can happen by simply capturing biometric data from people without their permission or knowledge
Biometric Template
is compared to the data storage; data is encrypted for security measures
Blagging
the act of convincing someone else to make them directly give away information such as passwords
Bot Activity
software application that runs automated tasks on the Internet, usually with the intent to imitate human activity
Anonymisation Proxy
a tool that attempts to make activity on the Internet untraceable by acting as an intermediary and privacy shield between a client computer and the rest of the Internet
CAPTCHA Solving Zombie
bots that can solve CAPTCHA
Cipher
message data after it has been encrypted
Click Fraud Zombie
the practice of artificially inflating traffic statistics for online advertisements
Closed Source Software
the collection and analysis of data gathered from closed sources to produce actionable intelligence
Custom Written Software
software that is custom written for a specific job or company
Cryptoanalysis
a method of trying to find the plain text from the cipher text without the decryption key
Cryptography
the science of designing cipher systems