LO2 Flashcards
What are vulnerabilities
Flaws or issues that results in weaknesses in the security of a system
What are examples of system attacks
Denial of servuce
Botnet
Social engineering
What is Botnet?
Where attackers place a piece of malware on a group of competitors to form a network under their control
Why would someone make a botnet?
Access sensitive data on individual data, launch DoS attacks, install more malware or send spam emails
What is social engineering?
Gaining the trust of individuals and using their trust to influence them to give confidential information.
What is a physical threat?
Any threat threat to the system or computer through physical access such as theft of the equipment
What is an environmental threat
Any threat which is a result of a natural event such as floods, fire, earthquakes etc
What are accidental threats?
Unintentional events that cause harm. e.g. spilling liquid on a computer or dropping a phone
What are intentional threats
Criminal activities with intent on harming the computer or system
What is state sponsored
Countries spying on each other to obtain information such as military campaigns, nuclear facilities, government policies.
What is money laundering
The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries
What is data mining?
The use of sophisticates tools to identify trends and patterns in large data stores
WHat is cyber enabled crime
Committing crimes such as fraud, theft and bullying via IT
What is cyber dependent crime
Crime that can only be carried out using computer networks
What is a hacktivist
illegal access to a computer system or network in order to promote their own views on a particular issue
What is a cyber criminal
Anyone who uses computers to perform malicious activities. such as sending spa, or committing fraud
What is an insider
A threat from inside the business. e.g. a disgruntled employee or employees with severe personal problems such as debt
What is a script kiddie
Someone who uses existing computer scripts to hack into computers and deface websites