LO2 Flashcards

1
Q

What are vulnerabilities

A

Flaws or issues that results in weaknesses in the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of system attacks

A

Denial of servuce
Botnet
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Botnet?

A

Where attackers place a piece of malware on a group of competitors to form a network under their control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would someone make a botnet?

A

Access sensitive data on individual data, launch DoS attacks, install more malware or send spam emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

Gaining the trust of individuals and using their trust to influence them to give confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a physical threat?

A

Any threat threat to the system or computer through physical access such as theft of the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an environmental threat

A

Any threat which is a result of a natural event such as floods, fire, earthquakes etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are accidental threats?

A

Unintentional events that cause harm. e.g. spilling liquid on a computer or dropping a phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are intentional threats

A

Criminal activities with intent on harming the computer or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is state sponsored

A

Countries spying on each other to obtain information such as military campaigns, nuclear facilities, government policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is money laundering

A

The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data mining?

A

The use of sophisticates tools to identify trends and patterns in large data stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHat is cyber enabled crime

A

Committing crimes such as fraud, theft and bullying via IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyber dependent crime

A

Crime that can only be carried out using computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hacktivist

A

illegal access to a computer system or network in order to promote their own views on a particular issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a cyber criminal

A

Anyone who uses computers to perform malicious activities. such as sending spa, or committing fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an insider

A

A threat from inside the business. e.g. a disgruntled employee or employees with severe personal problems such as debt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a script kiddie

A

Someone who uses existing computer scripts to hack into computers and deface websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a vulnerability broker?

A

Finds bugs in programmes and systems of other companies

20
Q

What are scammers?

A

People who offer goods or opportunities to others by sending emails with a false link.

21
Q

What are phishers

A

People who try to gain your personal data by sending emails claiming to be someone else and asking you to log in through the email to change your password.

22
Q

How can spam affect people

A

Can distribute malware and scams. Also annoying

23
Q

How can phishing affect people

A

Steal personal data such as passwords

24
Q

How can malware affect people

A

Steal data

can also make the computer obsolete (no longer able to be used)

25
Q

How can hackers affect a business

A

Steal data

business will have to deal with consequences of stolen data

could crash a website

26
Q

What are three things that hacktivists could be motivated by

A

Political gain
Righting perceived wrongs
score settling
public good
social change

27
Q

What are three things that cyber criminals could be motivated by

A

Score settling
Espionage
Cause disruption and havoc
Income generation

28
Q

What are three things that insiders could be motivated by

A

Score settling
Espionage
Financial gain
Personal gain

29
Q

What are three things that script kiddies could be motivated by

A

publicity
thrill
personal gain

30
Q

What are three things that vulnerability brokers could be motivated by

A

Personal gain
score settling
income generation

31
Q

What are three things that scammers could be motivated by

A

Financial theft
income generation
ID theft

32
Q

What are three things that phishers could be motivated by

A

Personal gain
income generation
ID theft
Financial theft

33
Q

What are three things that cyber terrorist could be motivated by

A

Causing destruction
Military gain
Financial gain
Political gain
Publicity

34
Q

How may a hacktivist attack people and organisations

A

Dos attacks
scripting
Botnet

35
Q

How may a cyber criminal attack people organisations, information and equipment

A

Malware
viruses
spam
Hacking
Cyber stalking

36
Q

How may an insider attack organisations

A

ID theft
privilege abuse
unintentional

37
Q

How may a script kiddie attack organisations

A

Worms
Malware
Viruses

38
Q

How may a vulnerability broker attack organisations?

A

Botnet
Worms
privilege abuse

39
Q

How may a scammer attack people (many people at once)

A

Email
pharming
ID theft

40
Q

How may a phisher attack people (individuals)

A

Email
pharming
Id theft

41
Q

How may a cyber terrorist target people, organisations and people

A

Social engineering
hacking
physical theft

42
Q

What are the global impacts of cyber security incidents

A

Cost
HR
cease of trading
communication blackouts

43
Q

What are individual impacts of cyber security individuals

A

Loss of internet
loss of data
loss of finances

44
Q

What are organisational impacts of cyber security impacts

A

Loss of rep
Theft
Financial loss
Law suits

45
Q

Who may an ethical hacker attack

A

Those who are perceived to lack certain morals. an ethical hacker may be a hacktivist

46
Q

What is a stakeholder

A

A person with a financial or professional interest in a business

47
Q
A