LO2 Flashcards

1
Q

What does it mean by the vulnerabilities of a computer system?

A

Any weaknesses within a computer system, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples system attacks?

A

Botnet
DoS
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a physical threats?

A

Theft of portable equipment e.g laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of environmental threats?

A

Floods
Fire
Earthquakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples accidental threats?

A

spilling liquids on a computer
responding to a phishing email
accidental uploading of malware
accidental deletion of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the intentional threats to cyber security?

A

hacking
social engineering
DoS
botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of organised crime?

A

cyber-enabled crime
cyber-dependent crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is state-sponsored threats?

A

countries spying on each other to obtain information such as nuclear facilities and to spread fake news.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the motivation of a hacktivist?
What are the characteristics of a hacktivist?

A

motivation - politically motivated
characteristics - activities are disruptive rather that destructive, they can be IT professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the motivation of a cyber criminal?
What are the characteristics of a cyber criminal?

A

motivation - financial gain, espionage, create havoc
characteristics - often work in organised groups, sells services to highest bidder, includes hackers and IT experts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the motivation for an Insider?
what are the characteristics of an insider?

A

motivation - personal use, financial gain, revenge
characteristics - lack of self-control, antisocial behaviour, desires revenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the motivation of a script kiddie?
what are the characteristics of a script kiddie?

A

motivation - wants the power of a hacker without the training
characteristics - teenagers, steal code claiming it as their own, little or no hacking skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the motivation of a vulnerability broker?
what are the characteristics of a vulnerability broker?

A

motivation - financial gain
characteristics - may have formally been a cyber criminal, high level of IT expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the motivation of a scammer?
what are the characteristics of a scammer?

A

motivation - financial gain, identity fraud
characteristics - may ask for money using a hard luck story, will not answer questions about themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the motivation of a phisher?
What are the characteristics of a phisher?

A

motivation - financial gain, identity theft
characteristics - can be from anywhere in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the motivation for cyber terrorist?
what are the characteristics of a cyber terrorist?

A

motivation - to instil fear in others, righting perceived wrongs
characteristics - can be based anywhere in the world, may have ideological or religious reasons for wanting to terrorise others, high end programming skills

17
Q

What are the three different targets for cyber security threats?

A

people
organisations
equipment

18
Q

What are three impacts of cyber security incidents?

A

reputation
safety
loss of data

19
Q

What are three examples of ethical hackers?

A

IT specialists employed by organisations
organisations monitoring employees
states spying on each other