LO1.2 Flashcards
What are the six types of cyber security incidents?
Unauthorised access
Information disclosure
Modification of data
Inaccessible data
Destruction
Theft
What are the two main types of unauthorised access?
Hacking
Escalation of privileges
What is hacking?
Illegally using a computer to access information stored on another computer system to spread a virus
What are the two types of escalation of privileges?
Vertical and horizontal
What is the difference between the two types of escalation of privileges?
Vertical escalation involves gaining higher-level privileges (e.g., from user to admin), while horizontal escalation involves gaining access to other users’ privileges at the same level
What is information disclosure?
Information passed to a person, organisation or state without the permission of the owner
What is modification of data?
Data that is entered, amended, stored or deleted without authorisation
What is inaccessible data?
Data that is not available to those with authorisation
Why might data be inaccessible?
Account lockout, Denial of Service (DoS)
How may ‘destruction’ happen?
Either indirectly through malware or deliberately through erasure
What is theft?
Stealing computer based information from an unknown victim with intent of compromising privacy or obtaining confidential information