LAB1 - Threats to data Flashcards

1
Q

6 reasons why systems are attacked

A

Fun/challenge, industrial espionage, financial gain, personal attack, disruption, data/information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain why a system would be attacked because of industrial espionage

A

To steal other businesses’ strategic designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain why a system would be attacked because of financial gain

A

To obtain money, for example by using ransomware, obtaining goods and services and theft from a bank account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

8 external threats

A

Unauthorised access/hacking, malware, denial of service attacks, phishing, pharming, social engineering, shoulder surfing, ‘man-in-the-middle’ attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 ways to protect systems from unauthorised access

A

Use strong passwords (update regularly), ensure software is updated regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

7 types of malware

A

Virus, worm, botnet, rootkit, Trojans, ransomware, spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 ways to protect systems from malware

A

Apply operating system updates, install and update anti-malware software, use a firewall, encourage staff to take security precautions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 ways to protect systems from denial of service attacks

A

Firewall, web servers can be configured to ignore DoS requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1 ways to protect systems from phishing

A

Not clicking links in emails/texts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 ways to protect systems from pharming

A

Up-to-date anti-malware software, safe computer user habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 ways to protect systems from social engineering

A

Provide staff training to increase awareness, challenge-response systems (require a response only authorised users will know)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 ways to protect systems from shoulder surfing

A

Computer terminals in public places are angled, protect passwords as they type, 2-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1 ways to protect systems from ‘man-in-the-middle’ attacks

A

Do not use unencrypted public Wi-Fi for security-sensitive purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly