LO2 Flashcards

1
Q

Name different threats to cyber security

A
Vulnerabilities  
Accidental
Intentional
Organised 
State sponsored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Vulnerabilities threat to cybersecurity

A

Any weakness within a computer system, network and procedures that leaves the security of information exposed to a threat from a cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is accidental threat to cyber security

A

Unintentional events, for example spilling liquid on a computer, responding to a phishing email, accidental upload of malware or accidental deletion of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is intentional threat to cyber security

A

Criminal activities intent on harming computer systems, for example hacking, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is organised crime threat to cyber security and the forms of it

A

cyber crimes that are organised individually or group organised in order to gain something There are two forms of organised crime cyber enabled crime and cyber dependent crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cyber enabled crime

A

Illegal activities that can be carried out without the use of computers for examples fraud, theft and bullying using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cyber dependent

A

illegal activities that depend on the use of computers and internet for example spreading malware and hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is state sponsored crime

A

Countries spying on each other to obtain information such as military campaigns, government policies and to spread fake news

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the types of hackers

A
Hacktivist
Cyber criminal 
Insider
Script Kiddie
Vulnerability broker 
Scammers (Cyber enabled)
Phishers (cyber dependent)
Cyber terrorists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what activity does a hacktivist do and list motivations of a hacktivist

A

Politically or socially motivated
- Disagree with someone else view point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What activity does cyber criminal do and list of motivations

A

Use computers to perform malicious activities eg, identity and data theft and spreading viruses, also use computers for sending spam or committing fraud, use computers as an accessory to save stolen or illegal data

Create havoc
financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What activtiy does an insider do and list of motivations

A

Threat from within an organisation such as an employee, former employee and these threats can be malicious or accidental

  • Personal use
  • financial gain
  • Revenge to settle a score
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What activity does a script kiddle do and list of motivations

A

Use existing computer scripts or code to hack into computers and deface websites

wants the power of a hacker without the training involved
thrill of hacking
publicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what activities does a vulnerability broker and list of motivations

A

find bugs in programs and systems of other companies and may sell information to other companies who are concerned

financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what activity does a scammer do and list of motivation

A

offer goods or opportunities to others to make quick money by sending emails with false links

financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what activity does a phisher do and list of motivation

A

obtain sensitive information for malicious intent such as obtaining credit card details to steal money by redirecting the person to a false website

financial gain
theft of intellectual property
identity theft

17
Q

what activity does a cyber terrorist do and list of motivations

A

Use computers and communication systems to cause fear in society through the destruction of property and systems by spreading malicious content

  • To install fear in others
  • Intimidate society into changing for the purpose of an ideological goal
18
Q

List targets for cyber security threats

A

People
organisations
equipment

19
Q

ways people can be targeted

A

Internet shopping for example fake websites

emails by sending fake links

20
Q

ways organisation can be targeted

A

internal/external hacking
Denial of service
data misuse
theft of data

21
Q

ways equipment can be targeted

A

stolen equipment
used under an unsecure network
left unattended

22
Q

Name the three types of hackers

A

White hat hackers
black hat hackers
grey hat hackers

23
Q

What are white hat hackers

A

Ethical hackers employed by organisations to identify vulnerabilities in their systems/ networks

24
Q

what are black hat hackers

A

hacker who breaks into computer systems or networks with malicious intent such as destroying data or stealing data for personal use

25
Q

What are grey hat hackers

A

Refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

26
Q

Impacts of cyber incidents

A

Probelms for induviduals, organisations
loss of confidentiality, integrity, avaliablity
Loss of reputation
Loss of customer confidence