LO2 Flashcards
What are vulnerabilities
Flaws or issues that results in weaknesses in the security of a system
What are examples of system attacks
Denial of servuce
Botnet
Social engineering
What is Botnet?
Where attackers place a piece of malware on a group of competitors to form a network under their control
Why would someone make a botnet?
Access sensitive data on individual data, launch DoS attacks, install more malware or send spam emails
What is social engineering?
Gaining the trust of individuals and using their trust to influence them to give confidential information.
What is a physical threat?
Any threat threat to the system or computer through physical access such as theft of the equipment
What is an environmental threat
Any threat which is a result of a natural event such as floods, fire, earthquakes etc
What are accidental threats?
Unintentional events that cause harm. e.g. spilling liquid on a computer or dropping a phone
What are intentional threats
Criminal activities with intent on harming the computer or system
What is state sponsored
Countries spying on each other to obtain information such as military campaigns, nuclear facilities, government policies.
What is money laundering
The process by which criminals hide the origins of their crime by transferring money through different bank accounts and countries
What is data mining?
The use of sophisticates tools to identify trends and patterns in large data stores
WHat is cyber enabled crime
Committing crimes such as fraud, theft and bullying via IT
What is cyber dependent crime
Crime that can only be carried out using computer networks
What is a hacktivist
illegal access to a computer system or network in order to promote their own views on a particular issue
What is a cyber criminal
Anyone who uses computers to perform malicious activities. such as sending spa, or committing fraud
What is an insider
A threat from inside the business. e.g. a disgruntled employee or employees with severe personal problems such as debt
What is a script kiddie
Someone who uses existing computer scripts to hack into computers and deface websites
What is a vulnerability broker?
Finds bugs in programmes and systems of other companies
What are scammers?
People who offer goods or opportunities to others by sending emails with a false link.
What are phishers
People who try to gain your personal data by sending emails claiming to be someone else and asking you to log in through the email to change your password.
How can spam affect people
Can distribute malware and scams. Also annoying
How can phishing affect people
Steal personal data such as passwords
How can malware affect people
Steal data
can also make the computer obsolete (no longer able to be used)
How can hackers affect a business
Steal data
business will have to deal with consequences of stolen data
could crash a website
What are three things that hacktivists could be motivated by
Political gain
Righting perceived wrongs
score settling
public good
social change
What are three things that cyber criminals could be motivated by
Score settling
Espionage
Cause disruption and havoc
Income generation
What are three things that insiders could be motivated by
Score settling
Espionage
Financial gain
Personal gain
What are three things that script kiddies could be motivated by
publicity
thrill
personal gain
What are three things that vulnerability brokers could be motivated by
Personal gain
score settling
income generation
What are three things that scammers could be motivated by
Financial theft
income generation
ID theft
What are three things that phishers could be motivated by
Personal gain
income generation
ID theft
Financial theft
What are three things that cyber terrorist could be motivated by
Causing destruction
Military gain
Financial gain
Political gain
Publicity
How may a hacktivist attack people and organisations
Dos attacks
scripting
Botnet
How may a cyber criminal attack people organisations, information and equipment
Malware
viruses
spam
Hacking
Cyber stalking
How may an insider attack organisations
ID theft
privilege abuse
unintentional
How may a script kiddie attack organisations
Worms
Malware
Viruses
How may a vulnerability broker attack organisations?
Botnet
Worms
privilege abuse
How may a scammer attack people (many people at once)
Email
pharming
ID theft
How may a phisher attack people (individuals)
Email
pharming
Id theft
How may a cyber terrorist target people, organisations and people
Social engineering
hacking
physical theft
What are the global impacts of cyber security incidents
Cost
HR
cease of trading
communication blackouts
What are individual impacts of cyber security individuals
Loss of internet
loss of data
loss of finances
What are organisational impacts of cyber security impacts
Loss of rep
Theft
Financial loss
Law suits
Who may an ethical hacker attack
Those who are perceived to lack certain morals. an ethical hacker may be a hacktivist
What is a stakeholder
A person with a financial or professional interest in a business