ICT Flashcards
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
Preventive strategies include installing and regularly updating antivirus software, and avoiding clicking on suspicious links.
Password Theft
Password theft refers to the unauthorized access to and use of someone’s password, leading to identity theft and data breach.
Preventive strategies include using strong, unique passwords, regularly updating them, and enabling two-factor authentication.
Traffic Interception
Traffic interception, also known as eavesdropping or sniffing, is the process of intercepting and potentially altering the communication between two parties without their knowledge.
Preventive strategies include the use of VPNs and encrypting data before transmission.
Phishing Attacks
Phishing attacks are attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Preventive strategies include employee education and awareness training, and the use of email filtering software.
Distributed Denial of Service (DDoS) Attacks
DDOS is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
Preventive strategies include the use of DDoS protection services and overprovisioning bandwidth.
Cross Site Scripting (XSS)
Also known as Cross-Site Scripting, XSS is a type of injection where malicious scripts are injected into trusted websites.
Preventive strategies include the use of web application firewalls, regularly updating and patching systems.
SQL Injection
SQL Injection is a code injection technique that might destroy your database. It is one of the most common web hacking techniques.
Preventive strategies include the use of prepared statements with parameterized queries, regular code review, and penetration testing.
Ransomware
Ransomware is malicious software designed to block access to a computer system until a sum of money is paid.
Preventive strategies include regular and secure backups of important data, and employee training and awareness.
Cryptojacking
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency.
Preventive strategies include the use of network monitoring tools, and regular system checks and updates.
Trojan Virus
A Trojan virus is a malicious program that performs actions not authorized by the user, such as modifying, blocking, or deleting data.
Preventive strategies include the use of robust antivirus software and avoiding downloading files or clicking on links from unknown sources.
Common Cybersecurity Strategies [7]
- Risk Assessment: Identify potential risks to ensure information security.
- Implementing Security Measures: Utilize antivirus, data encryption, secure routers, and other tools designed to protect against threats.
- Regular Updates and Patches: Keep all systems, software, and hardware up to date to protect against new threats.
- Access Controls: Implement strong user authentication and access control to ensure only authorized individuals can access sensitive data.
- Training and Awareness: Regularly train staff on safe online practices and how to identify security threats such as phishing emails.
- Cyber-Audits and Testing: Conduct regular audits and penetration testing to find potential weaknesses before they can be exploited.
- Disaster Recovery Plan: Have a plan in place to respond quickly in the event of a breach to minimize damage.
Types of Data Analytics for auditing [4]
- Predictive Analytics: Forecast future trends based on historical data.
- Prescriptive Analytics: Suggest actions to benefit from predictions.
- Diagnostic Analytics: Investigate past performance to determine cause.
- Descriptive Analytics: Use data aggregation and mining to provide insight into the past.
Disadvantages of Data Analytics in Auditing [4]
- Data Quality: Reliability depends on the accuracy of the data.
- Over-reliance on Data Analytics: May lead to neglect of professional judgment.
- Data Privacy and Security: Handling large volumes of sensitive data raises concerns.
- Cost: Investment in technology and training can be significant.
Use of ICT by Auditor [4]
- Meetings: Utilize teleconference facilities, including audio, video, and data sharing.
- Audit of Documents: Remote access to documents and records.
- Recording Information: Use still video, video, or audio recordings for evidence.
- Remote Access: Provide visual/audio access to remote or hazardous locations.
Benefits of Using ICT [4]
- Remote Auditing: Allows auditing from a distance.
- Data Analysis: Facilitates thorough analysis of data.
- Real-Time Monitoring: Enables monitoring of systems as they operate.
- Documentation: Assists in preparing and storing documents efficiently.
- Cost Reduction: Saves on travel and third-party expenses.