Information Assurance - Pointers Flashcards
- kind of electronic signatures but harder to obtain.
- They follow a specific protocol, called Public Key Infrastructure(PKI) and require a certificate issued by Certificate Authority(CA) that can prove the identities of signers and validate the signatures.
- hold higher levels of trustworthiness and authenticity than eSignatures. So they are often used for more significant transactions.
Digital signatures
- named as online signatures are a broader concept than digital signatures.
- use digital symbols to give legal authorization or approval for online transactions and agreements, which are the virtual alternatives to ink-on-paper signatures.
Electronic signatures
common cybersecurity threats
- Malware Attacks
- Phishing Scams
- Data Breaches
- Ransomware
- Social Engineering
can go undetected for a prolonged period, leading to continuous exploitation of the compromised system
Malware
refers to any software intentionally designed to cause damage to a computer, server, client, or computer network
Malware
Malware includes:
- viruses,
- worms,
- Trojans,
- ransomware,
- spyware
- adware
Once malware enters a system, it can
- corrupt files,
- steal sensitive data,
- gain unauthorized access to the system.
The potential impact of a malware attack is significant
- system damage
- data loss
- severe financial losses
are fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication
Phishing Scams
typically involves a fake email or website that mimics a reputable organisation.
Phishing Scams
The potential impact of a successful phishing scam
- identity theft,
- financial loss
- unauthorized access to systems
Data breaches can lead to a wide range of damaging effects
- financial loss,
- brand reputation damage,
- intellectual property loss,
- potential legal penalties
Ransomware can cause
- halt operations until the issue is resolved
- cost of the ransom demanded
- severe financial losses
tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data.
Social Engineering
be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
Social Engineering