LO2 Flashcards
Understand the issues surrounding cyber security.
Vulnerabilities
Flaws or issues that results in weaknesses in the security of a system. They can be intentional, accidental or a natural phenomenon.
System Vulnerabilities
Weaknesses within a network or system.
Examples of this are denial of service, botnet, malware, social engineering
Physical threats Vulnerabilities
Weaknesses within a network or system that happen in a physical sense.
Theft, Vandalism and arson etc.
Environmental Vulnerabilities
Weaknesses within a network or system that happen due to a environmental impact. Flooding and natural disasters etc.
Accidental threats
This is damage that happens to a network/data/system without actually intention of the individual causing harm. For example dropping a device and breaking it, spilling a liquid on a machine which contains information.
Replying to a hoax email without realising what it is.
Intentional threats
Criminal activities that have the intention to cause harm to a computer system. Hacking / Social engineering and theft etc.
Organised Crime
Cyber dependant and cyber enabled crime, stealing identities, blackmailing. teams of hackers working together to commit fraud and other crimes.
State Sponsored Crime
Countries who employ spies to find out state secrets, government polices etc. spying, espionage.
Hacktivist
Individuals and groups which use computers and computer systems to promote their own views on a particular issue such as human rights, animal rights or ethics. They hack into computer systems and cause disruption such as DDoS, steal or destroy information and put individuals, organisations and countries at risk.
Cyber Criminal
Anyone who commits a cyber-crime by breaking national or international law. They may use the computer in different ways to carry out the crime- as a tool e.g. commit fraud, send spam – to aim crime at a particular copter or system e.g. looking up information they are not allowed to read, installing Trojan horse, spreading Malware, stealing data, altering data
Insider
Insider threats are often disgruntled employees or ex-employees who believe that the business, institution, or agency has “done them wrong” and feel justified in gaining revenge. An insider threat could be: the introduction ofviruses,worms, orTrojan horses; the theft of information or corporate secrets; the theft of money; the corruption or deletion of data; the altering of data to produce inconvenience or false criminal evidence; and the theft of the identities of specific individuals in the enterprise.
Script Kiddie
is anunskilledindividual who usesscriptsor programs developed by others to attack computer systems and networks anddeface websites. The term, ‘Script kiddies’ does not relate to the actual age of the participant, but they are often young and inexperienced. It is anyone who lacks the ability to write their own sophisticated programs.
Scammers
Trying to cheat you by offering goods or opportunities to make some quick money. Scams often come via emails and are activated once clicked on. E.G. ‘click here to try the free trial of XXX’ to register pay £1 that will be refunded. The link will not work and you will not be refunded.
Vulnerability Broker
Several companies make money by either finding program bugs themselves or buying them from researchers of hackers to sell the information on – not to the company who created the program.
Phishers
Gain access to your personal details (passwords, bank account numbers, NI) normally an email is sent from your e.g. bank or Paypal asking you to click the link and log in. The link takes you to a webpage that looks like ‘Paypal’ but is fake. If data is entered then it will provide access to the phishers.
Cyber Terrorists
Use of computer systems to cause fear or intimidation in society through destruction of or damage to people, property and systems.
Motivations for hackers
- Espionage
- Righting perceived wrongs
- Publicity
- Fraud
- Score settling
- Public good
- Thrill
- Income generation
Targets for Cyber
- People
- Organisations
- Equipment
- Information
Money Laundering
The process by which criminals hide the origin if the proceeds of their crime, by transferring money through different bank accounts and countries to make it look as if it comes from a legal source
Data Mining
The process of using special software to look at large amounts of computer data in order to find out useful information, for example what types of product a company’s customers buy
Cyber enabled crime
which can only be committed by using a computer, computer network or other form of Information Communication Technology (ICT). They are primarily acts directed against computers or network resources and are typically offences under the Computer Misuse Act (CMA)
Cyber Dependent crime
Offences that can only be committed using a computer, computer networks or other form of information communications technology (ICT). These acts include the spread of viruses or other malware, hacking and distributed denial of service (DDoS) attacks.
Encryption
turning data and information into a format which can only be read by someone with the key.
Symmetric Key
where the encryption and decryption codes are the same
Asymmetric or public key
Where the encryption key is available to anyone to use and encrypt data but only the person who receives the message receives the decryption key.
Surveillance of networks
Traffic on the network is monitored if irregularities are found an alert is issued.
Operational Controls
- Encryption
* Surveillance of networks
Patch Deployment
The planned installation of software updates to fix bugs or any reported issues. This is needed to be planned in business as it may cause down time to specific systems.
Manual Vulnerabilities protection
For a small network rather than used automated tools, a technician or network manager will take steps required to remove or reduce vulnerability.
Automated Tools
Remediation tools which engage managers to prioritise risk so they can decide what vulnerabilities can be fixed and when.
Vulnerability Cycle
Disover > Prioritise Assets > Assess > Report > Remediate > Verify > Discover
Assets in Business
Hardware
Software
Communications Equipment
Information / Data
Cost/Benefits
There are varying costs to keeping cyber security up to date, it varies with each asset.
Testing and monitoring measures
IDS + IPS
Intrusion Prevention Systems
Devices or programs that detect attempts and intrusion and protect them. These systems can be hardware or installed software. It creates alerts and logs attempts of intrusion to the network, it also can BLOCK attempts.
Intrusion Detection Systems
Devices or programs that are designed to expose any attempts by attackers for attempts on the network.