LO2 Flashcards

1
Q

What are vulnerabilities

A

Flaws or issues that results in weaknesses in the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of system attacks

A

Denial of servuce
Botnet
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Botnet?

A

Where attackers place a piece of malware on a group of competitors to form a network under their control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would someone make a botnet?

A

Access sensitive data on individual data, launch DoS attacks, install more malware or send spam emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

Gaining the trust of individuals and using their trust to influence them to give confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a physical threat?

A

Any threat threat to the system or computer through physical access such as theft of the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an environmental threat

A

Any threat which is a result of a natural event such as floods, fire, earthquakes etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are accidental threats?

A

Unintentional events that cause harm. e.g. spilling liquid on a computer or dropping a phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are intentional threats

A

Criminal activities with intent on harming the computer or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is state sponsored

A

Countries spying on each other to obtain information such as military campaigns, nuclear facilities, government policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is money laundering

A

The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data mining?

A

The use of sophisticates tools to identify trends and patterns in large data stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHat is cyber enabled crime

A

Committing crimes such as fraud, theft and bullying via IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyber dependent crime

A

Crime that can only be carried out using computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hacktivist

A

illegal access to a computer system or network in order to promote their own views on a particular issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a cyber criminal

A

Anyone who uses computers to perform malicious activities. such as sending spa, or committing fraud

17
Q

What is an insider

A

A threat from inside the business. e.g. a disgruntled employee or employees with severe personal problems such as debt

18
Q

What is a script kiddie

A

Someone who uses existing computer scripts to hack into computers and deface websites

19
Q
A