LAB1 - Threats to data Flashcards
6 reasons why systems are attacked
Fun/challenge, industrial espionage, financial gain, personal attack, disruption, data/information theft
Explain why a system would be attacked because of industrial espionage
To steal other businesses’ strategic designs.
Explain why a system would be attacked because of financial gain
To obtain money, for example by using ransomware, obtaining goods and services and theft from a bank account.
8 external threats
Unauthorised access/hacking, malware, denial of service attacks, phishing, pharming, social engineering, shoulder surfing, ‘man-in-the-middle’ attacks
2 ways to protect systems from unauthorised access
Use strong passwords (update regularly), ensure software is updated regularly
7 types of malware
Virus, worm, botnet, rootkit, Trojans, ransomware, spyware
4 ways to protect systems from malware
Apply operating system updates, install and update anti-malware software, use a firewall, encourage staff to take security precautions
2 ways to protect systems from denial of service attacks
Firewall, web servers can be configured to ignore DoS requests
1 ways to protect systems from phishing
Not clicking links in emails/texts
2 ways to protect systems from pharming
Up-to-date anti-malware software, safe computer user habits
2 ways to protect systems from social engineering
Provide staff training to increase awareness, challenge-response systems (require a response only authorised users will know)
3 ways to protect systems from shoulder surfing
Computer terminals in public places are angled, protect passwords as they type, 2-factor authentication
1 ways to protect systems from ‘man-in-the-middle’ attacks
Do not use unencrypted public Wi-Fi for security-sensitive purposes