LO2 Flashcards

1
Q

What are vulnerabilities

A

Flaws or issues that results in weaknesses in the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of system attacks

A

Denial of servuce
Botnet
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Botnet?

A

Where attackers place a piece of malware on a group of competitors to form a network under their control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would someone make a botnet?

A

Access sensitive data on individual data, launch DoS attacks, install more malware or send spam emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

Gaining the trust of individuals and using their trust to influence them to give confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a physical threat?

A

Any threat threat to the system or computer through physical access such as theft of the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an environmental threat

A

Any threat which is a result of a natural event such as floods, fire, earthquakes etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are accidental threats?

A

Unintentional events that cause harm. e.g. spilling liquid on a computer or dropping a phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are intentional threats

A

Criminal activities with intent on harming the computer or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is state sponsored

A

Countries spying on each other to obtain information such as military campaigns, nuclear facilities, government policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is money laundering

A

The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data mining?

A

The use of sophisticates tools to identify trends and patterns in large data stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHat is cyber enabled crime

A

Committing crimes such as fraud, theft and bullying via IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyber dependent crime

A

Crime that can only be carried out using computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hacktivist

A

illegal access to a computer system or network in order to promote their own views on a particular issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a cyber criminal

A

Anyone who uses computers to perform malicious activities. such as sending spa, or committing fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an insider

A

A threat from inside the business. e.g. a disgruntled employee or employees with severe personal problems such as debt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a script kiddie

A

Someone who uses existing computer scripts to hack into computers and deface websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a vulnerability broker?

A

Finds bugs in programmes and systems of other companies

20
Q

What are scammers?

A

People who offer goods or opportunities to others by sending emails with a false link.

21
Q

What are phishers

A

People who try to gain your personal data by sending emails claiming to be someone else and asking you to log in through the email to change your password.

22
Q

How can spam affect people

A

Can distribute malware and scams. Also annoying

23
Q

How can phishing affect people

A

Steal personal data such as passwords

24
Q

How can malware affect people

A

Steal data

can also make the computer obsolete (no longer able to be used)

25
How can hackers affect a business
Steal data business will have to deal with consequences of stolen data could crash a website
26
What are three things that hacktivists could be motivated by
Political gain Righting perceived wrongs score settling public good social change
27
What are three things that cyber criminals could be motivated by
Score settling Espionage Cause disruption and havoc Income generation
28
What are three things that insiders could be motivated by
Score settling Espionage Financial gain Personal gain
29
What are three things that script kiddies could be motivated by
publicity thrill personal gain
30
What are three things that vulnerability brokers could be motivated by
Personal gain score settling income generation
31
What are three things that scammers could be motivated by
Financial theft income generation ID theft
32
What are three things that phishers could be motivated by
Personal gain income generation ID theft Financial theft
33
What are three things that cyber terrorist could be motivated by
Causing destruction Military gain Financial gain Political gain Publicity
34
How may a hacktivist attack people and organisations
Dos attacks scripting Botnet
35
How may a cyber criminal attack people organisations, information and equipment
Malware viruses spam Hacking Cyber stalking
36
How may an insider attack organisations
ID theft privilege abuse unintentional
37
How may a script kiddie attack organisations
Worms Malware Viruses
38
How may a vulnerability broker attack organisations?
Botnet Worms privilege abuse
39
How may a scammer attack people (many people at once)
Email pharming ID theft
40
How may a phisher attack people (individuals)
Email pharming Id theft
41
How may a cyber terrorist target people, organisations and people
Social engineering hacking physical theft
42
What are the global impacts of cyber security incidents
Cost HR cease of trading communication blackouts
43
What are individual impacts of cyber security individuals
Loss of internet loss of data loss of finances
44
What are organisational impacts of cyber security impacts
Loss of rep Theft Financial loss Law suits
45
Who may an ethical hacker attack
Those who are perceived to lack certain morals. an ethical hacker may be a hacktivist
46
What is a stakeholder
A person with a financial or professional interest in a business
47