Learning Aim B - Cyber Security Flashcards
All of the key parts of Learning Aim B, including Social Engineering & Security
Hacking
Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990
Why are systems attacked?
- Fun
- Financial Gain
- Industrial Espionage
- Personal Attacks
- Hacktivism (hacking for activism)
Types of Hackers
- Black Hat - a hacker with malicious intent
- Grey Hat - a hacker with neither malicious or heroic intent
- White Hat - a hacker with heroic intent to stop other hackers
Types of threat to a computer system
- Unauthorised access
- Virus
- Worm
- Botnet / DDoS Attack
- Rootkit
- Trojan
- Ransomware
- Spyware
Virus
A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
Cambridge Dictionary
Worm
Aa harmful computer program that can copy itself and spread across a number of connected computers
Cambridge Dictionary
Botnet
A group of computers that are controlled by software containing harmful programs, without their users’ knowledge
Cambridge Dictionary
DDoS
Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.
Cambridge Dictionary (mod.)
Rootkit
A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.
Kaspersky
Trojan
A computer program that has been deliberately designed to destroy information, or allow someone to steal it.
Cambridge Dictionary
Ransomware
Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.
Cambridge Dictionary
Spyware
Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
Cambridge Dictionary
Social Engineering
`
Manipulating people so that confidential information can be found out.
Why does social engineering work?
Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.
United States Department of Homeland Security
Types of Social Engineering
- Phishing - Where an individual poses as a legitimate company to steal sensitive information
- Pharming - Where a user is redirected from a legitimate site to another
- Shoulder Surfing - Where somebody physically looks at somebody’s computer system to steal sensitive information
- Tailgating - Where a hacker gains unauthorised access to a password-protected system
- Baiting - Where a scammer uses a false promise to steal personal information
- Pretexting - Where an attacker tries to convince a victim into giving up valuable information