LO2 Flashcards
Name different threats to cyber security
Vulnerabilities Accidental Intentional Organised State sponsored
What is Vulnerabilities threat to cybersecurity
Any weakness within a computer system, network and procedures that leaves the security of information exposed to a threat from a cyber attack
What is accidental threat to cyber security
Unintentional events, for example spilling liquid on a computer, responding to a phishing email, accidental upload of malware or accidental deletion of data
What is intentional threat to cyber security
Criminal activities intent on harming computer systems, for example hacking, social engineering
What is organised crime threat to cyber security and the forms of it
cyber crimes that are organised individually or group organised in order to gain something There are two forms of organised crime cyber enabled crime and cyber dependent crime
What is cyber enabled crime
Illegal activities that can be carried out without the use of computers for examples fraud, theft and bullying using IT
What is cyber dependent
illegal activities that depend on the use of computers and internet for example spreading malware and hacking
What is state sponsored crime
Countries spying on each other to obtain information such as military campaigns, government policies and to spread fake news
Name the types of hackers
Hacktivist Cyber criminal Insider Script Kiddie Vulnerability broker Scammers (Cyber enabled) Phishers (cyber dependent) Cyber terrorists
what activity does a hacktivist do and list motivations of a hacktivist
Politically or socially motivated
- Disagree with someone else view point
What activity does cyber criminal do and list of motivations
Use computers to perform malicious activities eg, identity and data theft and spreading viruses, also use computers for sending spam or committing fraud, use computers as an accessory to save stolen or illegal data
Create havoc
financial gain
What activtiy does an insider do and list of motivations
Threat from within an organisation such as an employee, former employee and these threats can be malicious or accidental
- Personal use
- financial gain
- Revenge to settle a score
What activity does a script kiddle do and list of motivations
Use existing computer scripts or code to hack into computers and deface websites
wants the power of a hacker without the training involved
thrill of hacking
publicity
what activities does a vulnerability broker and list of motivations
find bugs in programs and systems of other companies and may sell information to other companies who are concerned
financial gain
what activity does a scammer do and list of motivation
offer goods or opportunities to others to make quick money by sending emails with false links
financial gain